Bugs in QuickTime Leave Small- and Mid-Sized Businesses Vulnerable

Cyber security is an increasing issue for both small- and mid-sized companies, as threats continue to come in from a variety of sources. As a matter of fact, small- and mid-sized companies are attractive targets for cyber attacks. That’s because automation makes it easy and cost-effective for cyber criminals to launch attacks on small- and…

Read More

Protecting Your Business Against the Badlock Vulnerability

During late March of 2016, a vulnerability now called Badlock was found in the popular business network application Samba. Samba enables different kinds of computers to connect to files and printers on Microsoft Windows servers, the central platform for many businesses. Badlock is particularly serious, because it not only affects a whole range of different…

Read More

Do you know the true power of LinkedIn?

Everyone in the business world knows that LinkedIn is a powerful tool. However, many businesses have neglected to maximize its potential for marketing success. There is far more to LinkedIn than just connecting with some users and joining a few conversations. As LinkedIn continues to evolve, an increasing number of valuable features are being made…

Read More

Ransomware Highlights Vulnerabilities of Hospitals’ Security Systems

Patients everywhere would probably be surprised to learn just how vulnerable their medical records are. While most people are likely to think that their hospital is doing a fantastic job of keeping their sensitive medical and health data safe, the uptick in hackers that use so-called “ransomware” paints an entirely different story. The criminals use…

Read More

Is That a Human or a Robot on the Other End?

Spam From the Cloud I hate spam. I really do. And if you’re like me, you hate spam, too. Possibly something even worse are those robocallers, but you can probably figure them out pretty quickly. The problem is that now telemarketers have a new way to get into our faces — and it’s cheap. It’s…

Read More

Top Ten Ways To Create A Strong Password

Creating a password is not as easy as it has been in the past. People today are forced to make stronger passwords and keep track of several different ones. While this may seem complicated, it is important to create a strong password so that your information can be kept safe and secure. Use these tips…

Read More

What is a Business Continuity Plan and Why Do You Need It?

Disasters of the natural and cyber nature happen every day and many smaller companies are simply not prepared for the immense amount of recovery that it takes to get back to work. As a mid or smaller level company it is essential that a business continuity plan be in place to aid in the recovery…

Read More

Secure Data with These Privileged User Account Management Tips

A number of organizations are on track to review privileged online activity with reviews due for completion in the next two years. These reviews are expected to cut down on data theft and leakage by around one-third. In the meantime, there are a few things your IT department can do to manage privileged accounts and…

Read More