-
KRACK Attack: Protect Yourself from Severe Wi-Fi Vulnerability in All Devices
WPA2, the Wi-Fi protocol that protects most Wi-Fi-enabled devices, was recently compromised when a Belgian researcher uncovered a vulnerability in the protocol and published the details of the flaw. The…
-
[CHECKLIST] How to Protect Yourself from a Ransomware Attack
Due to the vulnerability of human nature, completely protecting your organization from a ransomware attack is difficult to manage on your own. But, by taking the following precautions, you’ll be…
-
In Case of Emergency: What to Do in a Ransomware Attack?
In a recent study of 4,000 small- and medium-sized companies, Kaspersky noted that 49% of SMB respondents reported ransomware as one of the most serious threats facing their organization. The…
-
What Is Spear Phishing and Why Is It So Dangerous?
You’ve ordered a dozen times from Amazon, but one day you receive an email asking you to confirm the details of your recent order. The problem is that you haven’t…
-
The Rise of Cyber-Insecurity
October is Cybersecurity Awareness Month. It’s a 14-year-old initiative established by the Department of Homeland Security to help raise the profile around various cybersecurity topics. Unfortunately, over the past few…
-
Cybersecurity Webinar Recap: New Attack Methods
Last year, Ginni Rometty, IBM’s chairman, president and CEO, said, “Cybercrime is the greatest threat to every company in the world.“ And she was right. CSO cites that during the next…
-
System Administrators: Fantastic Fixer of All Things Tech
If you’re reading this on your computer, smartphone or tablet, chances are your practice has an IT person that is responsible for making sure your device is securely connecting to…
-
The Evolution of the Public Cloud and Rise of the Hybrid Cloud
Nearly every American uses cloud services every day, in one way or another. Maybe you use the most common cloud platforms like Facebook and Instagram or a business-productivity application hosted…
-
Petya Ransomware Affecting Businesses Across the Globe
On Tuesday, June 27, a new wave of ransomware, known as Petya, started affecting Ukraine businesses with spillover to other countries including the USA. This new attack makes use of…
-
Social Engineering: How to Protect Your Practice from an Attack
Remember the great con-artist, Gregor MacGregor, known as the “king of all con-men?” He convinced people to invest in an entirely fictitious country that he had conjured up. More recently,…
-
“WannaCry” Malware Infestation Affects Systems Around the Globe
On Friday May 12, a new Malware infestation, dubbed “WannaCry”, began affecting systems in Europe and Asia. Though some action was taken to shut down the initial variant of this…
-
Ready for a Hardware Refresh? 3 Key Considerations
Has it been three to four years since you last refreshed your servers? Are your users frustrated because of slow workstations? Before you go out and purchase all new servers…