Category:

Network Security

How to Recognize and Avoid Phishing Scams

By Michael Hensley, Director of Professional Services As cyberattacks have become increasingly prevalent in recent years, the importance of effective cybersecurity preparation has grown exponentially. To safeguard assets and protect against hacking attempts, organizations have felt the pressing need to ramp-up their security measures by mandating appropriate training exercises and informational sessions for all employees. Despite recent technological innovations that…
Read article

IT Protection Checklist: Staying Cyber-Secure When Returning to Work

By Michael Hensley, Director of Professional Services As our communities have begun taking significant strides in easing shutdown restrictions and entering new phases of reopening, many businesses have begun to follow suit. While the number of COVID-19 cases continues to drop nationwide, our nation’s economy has surged in recent weeks as restaurants, retail stores, hair salons, and other small businesses…
Read article

Video: How to Solve Cybersecurity Challenges During COVID-19

As the COVID-19 crisis continues to evolve, we are making every effort to help your business stay safe from cyberthreats and other IT challenges. We teamed up with our trusted partners at Cyberstone to put together this informational video, which covers: Hacking campaigns and phishing attacks Trickbot banking trojans Tips from the National Cyber Security Center Virtual Private Networks (VPN)…
Read article

5 Ways to Prepare for the Windows 10 Update

Microsoft has announced that it will stop supporting Windows 7 after January 14, 2020, which means it will no longer provide tech support, software updates, or security updates to Windows 7 PC users. If you plan on using Windows 7 on your PC after this date, your computer will still work, “but it may become more vulnerable to security risks…
Read article

Data Privacy vs. Data Protection: What’s the Difference?

Ever hear the expression, “I don’t make the rules; I only enforce them”? It operates on the premise that two separate entities work in tandem to achieve the same desired result. We’ve seen it a hundred times: The policeman doesn’t write the traffic laws; he just gives you the ticket. The referee doesn’t write the hockey rules; she just puts…
Read article

Equifax Hack May Have Been Worse Than Initially Reported

Around September of last year we reported one of the largest data breaches in history, as 148 millions people had their information leaked due to hackers. As you may recall Equifax, one of the largest credit bureaus in the country, was compromised by cyber criminals, and a huge amount of vital confidential information was leaked. Anything from social security numbers,…
Read article

Big Bad Breach | 3rd Major Anthem Data Breach in 4 Years

[caption id="attachment_1100" align="aligncenter" width="608"] Photo by Dean Musgrove/Los Angeles Daily News[/caption] The bigger the company, the more responsibility falls on the decision makers to prevent hackers from gaining access to confidential data. In the healthcare industry, large corporations and medical entities like hospitals and insurance companies have immense amounts of confidential data about patients and clients. This makes for a…
Read article

“Petya” Cyber Attack in Ukraine Spreads Internationally

Just a matter of weeks following the accidental kill switch of  the “WannaCry” Ransomware attack that began in Europe, yet another serious ransomware attack shut down entire networks in the Ukraine. Just like the WannaCry attacks in May, the global hack shut down computers all over Europe, demanding a digital ransom for the owners to regain access to their files.…
Read article

Sophisticated International Cyber Attack Hits 150 Countries

Analysts are calling the global “ransomware” attack one of the biggest online extortion attacks in modern history. It has been reported that at least 100,000 different organizations have been compromised, at an international level. Companies, factories, government agencies are scrambling this morning to ensure that all necessary cyber security is in place. This points out the level at which the…
Read article