Tag Search: security
Posted on Tuesday May 17, 2016 | web development, web applications, security, python, php, javascript
ImageMagick, one of the internet's most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site's data, or corrupt it entirely. Let's take a look at what your SMB should be doing to protect itself from this security flaw.
Posted on Thursday April 28, 2016 | security, script kiddie, motives, insider, hacktivist, hackers, cyber criminal, attack
Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you'll have a better understanding of what resources need the most protection in your business.
Posted on Wednesday April 27, 2016 | technology, security, ransomware, healthcare, hackers, data, cyber criminals
Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here's an inside look at how the ransomware epidemic is affecting the US and Canadian healthcare systems.
Posted on Thursday April 21, 2016 | security, safety tips, office 365, microsoft, hackers, email, cyber attack
While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new security feature for Outlook, but only if you're an Office 365 user. Here's how it can help your business.
Posted on Thursday March 31, 2016 | workloads, virtualization, security, risks, patches, management, infrastructure, audit
When it comes to security, topics like the cloud and networks get wide coverage on Internet blogs and forums. However, other types of technology fly completely under the radar. Virtualization just so happens to fall into this category. And just because people aren't talking about it doesn't mean virtualized machines and infrastructure should be left unsecured. If you don't have the right defense in place, you're leaving your business vulnerable to hackers and cyber threats. Here are some of the major risks of insufficient virtualization security and a few methods to prevent them.
Posted on Tuesday March 15, 2016 | tips, technology, staff, security, productivity, policies, online monitoring, lawsuits, employees
Whether or not to monitor your employees' computers can be a tricky decision. While part of you may think it's unethical, you also may question if your staff are spending too much time on non-work related activities, and taking advantage of you in the process. So, should you monitor? Here are some pros and cons of monitoring, and some tips to effectively do it if you decide it's right for your business.
Page: 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647