One of the common themes that’s permeated a lot of the meetings I’ve been having with both current and prospective clients lately can all be summed up in a single word: security. These chats may not, however, be taking the shape you probably think they are. Yes, cyber security is critical and it’s an issue … Continued
During a recent data security expo hosted by Taiwan’s Presidential Office, 54 malware-infested thumb drives were handed out to the public by the Criminal Investigation Bureau. These infected USB sticks were among the 250 drives the bureau gave to winners of a game about cybersecurity knowledge at their exhibit.
A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time. A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.
Each year, researchers from SplashData revealed the worst passwords of 2017, based on the over 5 million stolen login credentials made public over the year. Despite the continued warnings from cybersecurity experts, people continue to choose weak, easily guessable passwords to protect their most precious information.
Chrome Cleanup uses ESET technology to identify and eradicate suspicious or unwanted software on your Windows computer. The tool operates in the background, with no slowdowns or interruptions to the user with three easy steps.
I just found a very interesting blog post by Jerome Wendt, President & Lead Analyst of DCIG, Inc., an independent storage analyst and consulting firm. He started out with “The prevailing wisdom is that if you back up your data you can recover from a ransomware attack. While this premise generally holds true, simply backing … Continued
In a report conducted by Osterman Research and sponsored by Malwarebytes, more than 1,000 small and medium-sized businesses were surveyed in June 2017 about ransomware and other critical security issues. What we discovered was surprising—ransomware authors aren’t only targeting enterprise businesses for big payouts. They’ve got their greedy gaze on businesses of all sizes. In … Continued
Data breaches are running 29% above last year, according to a report released by the Identity Theft Resource Center and Cyberscout. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. More than 12 million records have been exposed, although two-thirds of data breach notifications or public notices did … Continued
We live in a tech-driven world; whether in the office, at home, the car, or even in sky, the convenience and access to vast amounts of information is always a fingertip away. If you ignore innovation, you risk rendering yourself obsolete. However, when you’re responsible for making technology investment decisions for an entire organization, being … Continued
Network Infiltration and Data Breaches are normally blamed on the malicious outsider. However, the responsibility for most organizations network security is with their employees, who unwittingly open the door welcoming cybercriminals into your environment. That’s why it’s crucial to properly educate your employees about Cybersecurity. When you provide routine training as a preventative, not reactive, … Continued