Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cybercriminals have discovered a new attack method using Microsoft Office. What’s the new Office threat? […]
Beware of sneaky Microsoft Office malware
Equifax’s Leak: lessons learned
No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]
What are the advantages of SaaS?
Almost every business relies on software to operate, and for most SMBs, the costs of software — including license and maintenance — are painfully expensive. So is there a solution that allows you to leverage the power of software without a high price tag? One candidate is the software delivery service called SaaS. Read on […]
Microsoft released security updates for all versions of Windows
Windows is the most widely used operating system in the world, and for this reason it is also the most frequently targeted platform for hackers. In an attempt to shut down cyber criminals before they can exploit vulnerabilities, Microsoft recently rolled out a new security patch that fixes several known bugs for all versions of […]
Beware of a new Locky-type ransomware
Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of […]
Fruitfly spyware targets Mac computers
Contrary to popular belief, Macs do get hacked. Although it doesn’t happen as frequently as it does on Windows PCs, Macs have been infected by worms, Trojan horses, and other forms of malware in the past decade. Recently, security researchers discovered a new spyware that has flown under the radar for several years. Fruitfly spyware […]
Ransomware protection for Windows 10
The development of global ransomware attacks like WannaCry is a worrying trend for many computer users, especially for those with outdated Windows PCs. Fortunately, Microsoft is adding some much needed security features in Windows 10 to help keep users safe. If you are a Windows user, here’s why you can’t afford to miss this critical […]
Quick review: why you need virtualization
With virtualization, you can make software see several separate computers where there is only one, or make several computers look like one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few. More technology uptime Virtualization vendors use lots of fancy names […]
Does the CIA have access to your router?
There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security. The Wikileaks CIA documents For several months, the notorious website famous for leaking government […]
Fixing computers drains your firm’s funds
Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t necessarily mean they should. In fact, such occurrences ought to be minimized, if not avoided altogether. Your security personnel should be focusing on more pressing issues. But if they’re toiling over PC repairs, not only […]
