So, you’ve been hearing a lot about cloud computing. If you’re anything like me, you’ve probably had a moment or two where you’ve wondered, “Is my data actually safe up there in the… well, cloud?” This is one of many cloud security myths that make businesses miss out on the capabilities that the right cloud […]
Category Archives: Network Security
We’ve all been there: one minute everything at work is running just fine, and the next minute you can’t get websites to load, or your file upload or download speeds slow to a crawl. When this happens at home after work, it’s an inconvenience — and most of the time rebooting your router, modem, […]
With the recent congressional hearing on TikTok security and data privacy rules, we thought we might take a slight deviation from our typical coverage to discuss a topic that is on a lot of lips. Along with some comical moments that highlighted almost complete ignorance from several members of congress on how the internet works, […]
They how and why of cybersecurity are numerous and varied. Here we’ll discuss endpoint attacks specifically, and some of the more common attack vectors. We’ll also touch on a few primary ways to prevent these breaches, and why business owners should care. How are they getting in? Here are several common attack types User Initiated […]
Every year there are nearly 10,000 websites banned by Google for being hacked. These websites have lost nearly 95% of their organic traffic and revenue. Keeping your site secure is now more important than ever. When your website is hacked, Google will blacklist your site, marking it as not secure and removing it from the […]
The world is a dangerous place. Keeping your business safe online can be a chore. There are a lot of good reasons why you should enable office 365 two factor authentication. The fact that it makes keeping your data safe easier is one. Here are a few more. Ease of Use Security needs to be […]
Endpoint Detection and Response software is the newest iteration of Anti-Virus software. It’s got a new title because EDR does a lot more than your traditional antivirus to protect you against threats. It’s also one of the only solutions that can offer some protection against ransomware. What is EDR Software The definition goes something like […]
The world of Cyber Security is full of evolving threats. We hear about new attack vectors every day and have a very creative bunch of bad actors coming up with new ways to make trouble. Ransomware is rampant. Phishing is on the uptick. IT teams struggle to keep their staff trained on all the security […]
A critical security vulnerability called FORCEDENTRY on IOS and MacOS devices means you should update immediately. Earlier this week apple released a critical software patch to fix an exploit that allows attackers to directly infect iPhones and other Apple devices. No user interaction is needed, which makes this attack particularly dangerous. The exploit was originally […]
That Nigerian prince has finally grown up. Business Email Compromise or BEC is a real and evolving threat. It may have started with humble beginnings but has been continually evolving. Attackers are leveraging a remote workforce and COVID-19 to continue to exploit businesses. Here’s what to look out for in 2021. Money Transfer Requests Accounting […]