Some ransomware strains are free to decrypt

March 23rd, 2017

2017March22Security_ARansomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure.

Is fileless malware a threat to you?

March 4th, 2017

2017March3Security_AThere have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger.

What exactly is preventive cyber-security?

February 16th, 2017

2017February15_Security_AThere has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

Browsers leak sensitive info to hackers

January 28th, 2017

2017January27_Security_AThe Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much on autofill.

Cyber security and managed services

January 13th, 2017

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.

Ransomware demands more victims for freedom

December 29th, 2016

2016december28_security_aPopcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers.

Predicting cyber-threats in 2017

December 14th, 2016

hackerscybersecurity-170px-01As 2017 rolls in, the threat of more formidable cyber attacks looms large. Hackers and the cyber police will spend a lot of time outsmarting each other, while consumers of technology, individuals and businesses alike, anticipate the best security plan that can guarantee they sleep soundly at night.

Five tips to avoid a security breach

November 26th, 2016

2016november25_security_aIf you’ve read this blog before, you already know security is paramount to the success of any small business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, devices and networks have been illegally accessed by unauthorized people.

Young workers are more gullible to tech scams

November 11th, 2016

2016november10_security_aThe old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists are targeting the younger generation — and succeeding.

2 types of identity verification, explained

October 26th, 2016

2016october25_security_aCyber security is becoming more and more important in an increasingly digital age. While many people and businesses know how important their online security is, they may not know what types of online security are best, nor the differences between the most commonly available options.