Undoubtedly, 2018’s first set of truly bad news involves reports about the Spectre and Meltdown bugs, fundamental flaws in computer processors that can leak highly sensitive data. Researchers say they affect a majority of modern computers, and chances are your business’s devices are also affected. Luckily for Mac, iPhone and iPad users, there are ways […]
Mobile phones are just as prone to cyber attacks as desktop PCs, and cyber scammers are relying on unsecured devices to carry out their deeds. If you haven’t implemented a cyber security guideline for your company’s mobile devices, you can start by following these easy steps.
When you visit an encrypted website, the connection between the source of the web page and your browser is secure. Encryption ensures users’ browsing habits are safe from hackers’ prying eyes, but phishing scammers have found a way to adopt it for their own schemes.
You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are — if the computer you’re using doesn’t have a keylogger installed.
Security breaches are becoming an all-too-common occurrence in the healthcare industry. Due to a sever lack of competent security measures to protect extremely vital patient records, healthcare organizations have become a prime target for hackers and malicious insiders alike.
Almost every macOS update comes with a security patch that users often dismiss. If you’ve read about KRACK, then you should know that updating your Mac’s operating system to macOS 10.13.1 High Sierra is extremely important. Here’s everything you need to know about Apple’s latest Mac OS. Why you should update now Foremost on Apple’s […]
In the world of cybersecurity, there’s no time to rest. Hackers are constantly developing malware, and reusing attacks that were successful in the past. Recently, hackers have revived the Locky ransomware, and it has already infected thousands of computers worldwide.
VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. Naturally, shrewd scammers have found a way to use VoIP as a means to carry out ‘vishing scams,’ a new type of phishing whereby fraudsters make phone calls, pose as a business or financial partner, and request private details.
Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.
The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.
As workplace IT gets more and more hi-tech, the average user gets further from the building blocks that keep it running. At times that seems like a good thing, but if you aren’t aware of the most basic aspects of your hardware, you could be vulnerable to a nasty cyber attack.
Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices.