Archive for April 2016
Bugs in QuickTime Leave Small- and Mid-Sized Businesses Vulnerable
Cyber security is an increasing issue for both small- and mid-sized companies, as threats continue to come in from a variety of sources. As a matter of fact, small- and mid-sized companies are attractive targets for cyber attacks. That’s because automation makes it easy and cost-effective for cyber criminals to launch attacks on small- and…
Read MoreProtecting Your Business Against the Badlock Vulnerability
During late March of 2016, a vulnerability now called Badlock was found in the popular business network application Samba. Samba enables different kinds of computers to connect to files and printers on Microsoft Windows servers, the central platform for many businesses. Badlock is particularly serious, because it not only affects a whole range of different…
Read MoreDo you know the true power of LinkedIn?
Everyone in the business world knows that LinkedIn is a powerful tool. However, many businesses have neglected to maximize its potential for marketing success. There is far more to LinkedIn than just connecting with some users and joining a few conversations. As LinkedIn continues to evolve, an increasing number of valuable features are being made…
Read MoreUSB Thief Appears Undetected, Then Leaves With Your Sensitive Information
By now, most people are aware of the harm that both viruses and malware can do to your sensitive information. This is also an issue that small businesses need to be concerned about as their financial and customer information could be compromised. A new threat, USB Thief, means that computer users might not even realize…
Read MoreRansomware Highlights Vulnerabilities of Hospitals’ Security Systems
Patients everywhere would probably be surprised to learn just how vulnerable their medical records are. While most people are likely to think that their hospital is doing a fantastic job of keeping their sensitive medical and health data safe, the uptick in hackers that use so-called “ransomware” paints an entirely different story. The criminals use…
Read MoreIs That a Human or a Robot on the Other End?
Spam From the Cloud I hate spam. I really do. And if you’re like me, you hate spam, too. Possibly something even worse are those robocallers, but you can probably figure them out pretty quickly. The problem is that now telemarketers have a new way to get into our faces — and it’s cheap. It’s…
Read MoreRansomware: Why It’s a Growing Threat and How to Protect Your Business
One of the biggest threats to businesses today is ransomware. These attacks have become so frequent that the US Department of Homeland Security was forced to team with the Canadian Cyber Incident Response Centre to educate the public about how to deal with these issues. In fact, the infections are so dangerous that in a…
Read MoreTop Ten Ways To Create A Strong Password
Creating a password is not as easy as it has been in the past. People today are forced to make stronger passwords and keep track of several different ones. While this may seem complicated, it is important to create a strong password so that your information can be kept safe and secure. Use these tips…
Read MoreWhat is a Business Continuity Plan and Why Do You Need It?
Disasters of the natural and cyber nature happen every day and many smaller companies are simply not prepared for the immense amount of recovery that it takes to get back to work. As a mid or smaller level company it is essential that a business continuity plan be in place to aid in the recovery…
Read MoreSecure Data with These Privileged User Account Management Tips
A number of organizations are on track to review privileged online activity with reviews due for completion in the next two years. These reviews are expected to cut down on data theft and leakage by around one-third. In the meantime, there are a few things your IT department can do to manage privileged accounts and…
Read More