Healthcare: Prevent insider threats

Healthcare is the only industry where insider threats pose the greatest threat to sensitive data, with 58 percent of security incidents coming from people working within the organization itself. Here’s a look at five ways to prevent such breaches. #1 Educate – The workforce (meaning all healthcare employees) must be educated on allowable uses and […]

iPhone security impenetrable no more

Cellebrite claims that they have devised “undisclosed techniques” to unlock Apple devices running on any iOS operating system. The U.S. government contractor based in Israel recently notified clients of their ability to circumnavigate iOS protections that’s part of their new service for forensic specialists and law enforcement. iPhone vulnerabilities leaked, is it true? A couple […]

Cryptojacking: How to protect yourself

Over time, your computer will work slower as software requirements become more demanding. But if you have a relatively new computer, and are experiencing performance problems after clicking a link or visiting a website, you might be the victim of a new cyberattack scheme known as cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to […]

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication and scope over the past few years. And given its widespread success with hackers, more ransomware attacks will likely be developed further into 2018. In anticipation of these attacks, many experts are saying that virtualized disaster recovery solutions may be the best way to defend against […]

Fortify your data, physically

Truly optimized security settings and software are beyond the capacity of most business owners. You just don’t have time to tinker with your office IT. Instead, try these quick and easy tips before calling us. Cover up your webcam There must be some credibility to doing this if Facebook founder, Mark Zuckerberg, former FBI director, […]

The risks of auto-complete passwords

If you’re disturbed by advertisements and “helpful” suggestions that are based on your internet browsing habits, recent research has found yet another source of online tracking. It’s a sneaky tactic that also comes with serious security concerns. Let’s take a look at what you can do to stop it from targeting you. Why auto-fill passwords […]

It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment. See for yourself! Small businesses love […]

What you need to know about VPNs

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities. You need a Virtual Private Network (VPN). What is VPN? Simply put, […]

Cyber weapons for sale by dangerous hackers

“Script kiddies” are a type of computer hacker that copies malware programs from more experienced creators and put their own name on it. WannaCry was programmed by script kiddies, and the group they stole the malware from is selling a new set of vulnerabilities. Who are the ShadowBrokers? There are several theories about who the […]