Beware of the Meltdown and Spectre patches

Installing security patches is usually such a humdrum task that even the most inexperienced users handle it. Unfortunately, that has not been the case with the Spectre and Meltdown fixes. This time around, we recommend you skip installing the update and let an IT professional handle it for you. Unsecured data storage Spectre and Meltdown […]

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware. In 2017, a new Locky ransomware is poised to duplicate the success of […]

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security. The Wikileaks CIA documents For several months, the notorious website famous for leaking government […]

Fixing computers drains your firm’s funds

Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t necessarily mean they should. In fact, such occurrences ought to be minimized, if not avoided altogether. Your security personnel should be focusing on more pressing issues. But if they’re toiling over PC repairs, not only […]

Protect your data from WannaCry

This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the ransom. What’s more alarming, however, is that the global success of this malware will likely spawn even more potent variants. […]

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]

Chrome and Safari: hackers’ newest tools

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to relying on their browsers’ autofill function to save time. But being able to […]

New cyber-threats in 2017 to watch out for

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, like snakes slithering into your home, cyber attackers also keep up with technological changes for their own nefarious ends. Knowing […]

What’s the best way to verify user identity?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people. Before you give up on […]