Category:

Cybersecurity

Salami Attacks: What Are They and How Can They Be Prevented?

New digital innovations, particularly when it comes to payment technology, have allowed businesses to operate more efficiently and improve the customer experience. But there have been some unintended, far less desirable consequences, too. Salami attacks, a form of cybercrime targeting banks and financial institutions, are one example. Here’s what you need to know about this often-overlooked online attack that has…
Read article

Phishing Attacks: How to Recognize Them and Keep Your Business Safe

Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. The new “work from anywhere” world puts everyone at risk of cyber-attacks. One commonly used tactic is phishing. Phishing messages are crafted with the end goal of capturing a person or an organization’s…
Read article

Identifying and Preventing Email Phishing Attacks

Criminals use phishing, a type of online scam, to impersonate legitimate companies to steal sensitive information. Why is this scam referred to as phishing? The term “phishing” is a spin on the word fishing because criminals dangle a fake “lure”— that looks legitimate and is sent from a reputable company—hoping to get users to “bite” by providing sensitive information like…
Read article

Top 3 Reasons to Back Up Your SaaS Data

Microsoft 365 and Google Workspace are being adopted by businesses at an enormous rate. However, their popularity makes them attractive targets for cybercriminals. One of the most business-friendly innovations in recent years has been the rapid growth of cloud applications like Microsoft 365 and Google Workspace. These Software-as-a-Service (SaaS) apps have fundamentally changed the way we do business, enabling companies…
Read article

9 Cybersecurity Tips Every Business Should Follow

A massive global shift to remote working environments has created an open season for cybercriminals. No business - big or small - is safe. Small and medium businesses (SMBs) seemingly have a target on their backs, so strengthening your company’s security posture is essential right now There are ways to protect business data against cyber attacks. Here are nine tips…
Read article

What is Endpoint Backup and Why Do You Need it?

Whether you experience a ransomware attack, lost or stolen device, or the accidental deletion of a file, a recovery solution is essential. Employee devices, and the network at large, carry critical business information that is often left out of company backup policies.  In these scenarios, an inadequate endpoint (PC's and laptops) backup option can result in lost data, lost time,…
Read article

Azure Data Protection: Why Cloud Servers Need Backup

A common misconception is that moving to the cloud means no longer having to backup data. This idea encourages businesses to take unnecessary risks with Software as a Service (SaaS) applications like Microsoft 365 and Infrastructure as a Service (IaaS) clouds like Microsoft Azure. There are many reasons for growing businesses to take advantage of the flexibility, scalability, and other…
Read article

What is Ryuk Ransomware and How Does it Work?

Ryuk is a type of ransomware that encrypts files on an infected system, with ransom typically demanded in bitcoin or other types of cryptocurrency. Ryuk has targeted many large organizations using Microsoft Windows and related systems. First spotted in August 2018, it was initially thought to be a group that operates out of North Korea, but now is believed to…
Read article

Pro Tips: Protecting Against Phishing and Ransomware

Many small and medium businesses (SMBs) who allowed employees to work remotely for the first time in 2020 have decided to continue to support remote work indefinitely, at least for some employees who prefer it and have proven they can work productively in that mode. Even those businesses who summon most employees back to the office now operate in a…
Read article

What is Maze Ransomware and How Does it Work?

Maze Ransomware has been in the headlines non-stop ever since it was first reported in May 2019, when its authors used “Missed package delivery” and “Your AT&T wireless bill is ready to view” emails to trick recipients into opening messages with malicious payloads. Maze has been used to attack individual companies, governments, and increasingly – and perhaps most worryingly –…
Read article