A Terrible Phishing Scam You Should Know about That’s Impacting Business Just like Yours

A Terrible Phishing Scam You Should Know about That’s Impacting Business Just like Yours

2019 has already become quite a year for Phishing scams. As many of you have seen, the newest ones are very deceiving; they seem to come from right inside your own company.

A new wave of invasions. Over the past few months, we have seen thousands of e-mails come in from outside resources that are all dressed up to look just like your boss is e-mailing an urgent task.

4 Dangerous Passwords

4 Dangerous Passwords

Even though remembering passwords is a pain, strong passwords can save you a bundle in damages. Make sure to stay away from these terrible passwords:

Password, no matter how you use it, is a bad idea. No using P@ssword or P@55w0rd! Just don’t use it at all.

3 Ways to Secure Your Network Because Luck Is What Happens When Preparation Meets Opportunity

3 Ways to Secure Your Network Because Luck Is What Happens When Preparation Meets Opportunity

Ransomware has mostly faded from the headlines since WannaCry and NotPetya wreaked havoc across the globe in 2017. The attacks sparked so much alarm that more people than ever are backing up their files, which effectively deadens a ransomware attack, but are your efforts working and in place today?

Too many of us have short memories and as the WannaCry sobs become a faded memory, cybersecurity experts warn against getting lazy about backing up your files.

Threats facing financial institutions today

Threats facing financial institutions today

Despite efforts to remain secure, financial services make up 35% of all data breaches, earning the unfortunate title of most breached sector. It provides multiple avenues for cybercriminals to monetize their skills through extortion, theft, and fraud. These incidents compel businesses and individuals to take cybersecurity seriously. How prepared is your business? A good starting […]

Fileless malware: The guileful threat

Fileless malware: The guileful threat

Fileless malware isn’t new and are an increasingly prevalent threat against organizations. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them. Let’s take a closer look at how it works […]

Autocomplete password risks

Autocomplete password risks

Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Why you need a VPN and how to choose one

Why you need a VPN and how to choose one

Back in the day, simple antivirus software was all you needed to stay safe from security threats. Nowadays, it takes more than that to protect your online privacy. Whether you’re sending emails or chatting up a friend online, chances are your Wi-Fi connection can be intercepted. This is why you need a virtual private network […]

Your password may be poor — update it now

Your password may be poor — update it now

For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why not and how it involves you. The problem The issue isn’t necessarily that […]

3 Types of hackers you should know about

3 Types of hackers you should know about

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history In the […]