What’s the best way to verify user identity?

October 25th, 2016

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins are crucial, the differences between the various security measures may be lost on many people.

Social engineering and personal security

October 7th, 2016

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit, criminals resort to manipulating information from their targets via social engineering. This burgeoning field allows criminals to trick people into disclosing sensitive information such as passwords and bank information.

IT jargon: a glossary of cybersecurity terms

September 21st, 2016

Everyone hates jargon. It’s ostracizing and off-putting, but somehow we just keep creating more and more of it. For those who have adopted an “if you can’t beat ‘em, join ‘em” philosophy, we have just the list for you. Let’s take a look at some of the most relevant cybersecurity terms making the rounds today.

Change your Dropbox password

September 2nd, 2016

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong -- passwords had been compromised as well.

Beware of these social engineering tactics

August 18th, 2016

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own.

Two new tools for defeating ransomware

August 1st, 2016

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many cases end in disaster for your business.

5 tips to help deal with security headaches

July 14th, 2016

Keeping your company data safe and secured is not an easy job, especially as cyberattack threats get more and more sophisticated every day. But fret not, there are a lot of simple solutions that can be achieved with almost any level of tech expertise.

The latest WordPress release fixes major issues

July 5th, 2016

Although WordPress is more secure than it used to be, outdated installations can be a potential threat to your website and the data that is hosted on the servers. In an attempt to shut down hackers before they can exploit vulnerabilities, the WordPress security team recently rolled out a new version that patches security loopholes and fixes several known bugs.

NBA team latest victim of spoofed email

June 20th, 2016

For some NBA fans, the Milwaukee Bucks have long been a laughingstock on court. However, their most recent loss is no laughing matter. According to Yahoo! Sports, last month a team employee unknowingly sent out names, addresses, Social Security numbers, compensation information and dates of birth of players to a spoofed email account operated by a hacker.

Threat alert: self-replicating ransomware

June 9th, 2016

The worrisome rise of ransomware doesn’t seem to be slowing as Microsoft recently announced the detection of self-propagating iterations of the malware. With this evolution, it is essential for SMBs to update their understanding of this security threat in order to properly protect themselves.