Security Threats Posts

What You Need to Know About the Meltdown and Spectre CPU Flaw

On January 16th, 2018, posted in: Security Threats by 0 Comment

Some computer security issues are rather isolated, confined to a single operating system or an obscure piece of software. Others are more widespread, affecting millions of users and spanning the entire globe. The newly discovered Spectre and Meltdown CPU flaws clearly belong in the latter category. Unlike some other security flaws, which were fairly limited..

read more

Beware of this Office 365 Phishing Scam

On December 6th, 2017, posted in: Security Threats by Comments Off on Beware of this Office 365 Phishing Scam

Recently, a host of new Office 365 phishing scams have taken resurgence. Phishing emails are widely used and are often one of the most successful ways cyber criminals gain access to business networks. Industries like journalism, office administration, legal, marketing, sales and human resources have a higher risk when it comes to phishing emails because..

read more

Equifax Data Breach: What You Need to Know

On October 4th, 2017, posted in: Security Threats by Comments Off on Equifax Data Breach: What You Need to Know

By now, you’ve heard about the massive Equifax data breach that hit widespread media headlines on September 7th, 2017. Equifax is one of the nation’s three key credit bureaus that tracks and stores individuals’ credit histories, along with a treasure trove of other personal information such as social security numbers. While the term “data breach”..

read more

How to Budget for Cyber Security

On September 7th, 2017, posted in: Security Threats by Comments Off on How to Budget for Cyber Security

Cyber security is a moving target, not a “set it and forget it” part of your IT infrastructure. For this reason, budgeting for cyber security isn’t as simple as budgeting for new technology, such as a new server, phone system or wireless network. Security is a process, not a project. As these variables change, they..

read more

5 Ways to Get Rid of Spam Once and For All: Declare Your Independence from Spam

On July 6th, 2017, posted in: Security Threats by Comments Off on 5 Ways to Get Rid of Spam Once and For All: Declare Your Independence from Spam

July is the time of the year we celebrate freedom and independence with barbecues, picnics, and family gatherings. It’s one of the few months we actually try to work a little less, get some rest, kick back and enjoy the beautiful weather. But do you know who doesn’t rest? Spammers. That’s right. Spammers don’t take..

read more

7 Password Do’s and Don’ts: The Worst Password Mistakes and How to Fix Them

On July 6th, 2017, posted in: Security Threats by Comments Off on 7 Password Do’s and Don’ts: The Worst Password Mistakes and How to Fix Them

Cybersecurity is a growing concern for businesses of all sizes and it’s no wonder – cybercrime is big business. In fact, Cybersecurity Ventures predicts global annual cybercrime costs are expected to grow from $3 trillion in 2015 to $6 trillion annually by 2021! In Verizon’s 2016 Data Breach Investigations Report (DBIR), they found that 63%..

read more

7 Warning Signs Your Business Network is Not Secure

On May 3rd, 2017, posted in: Security Threats by Comments Off on 7 Warning Signs Your Business Network is Not Secure

The security of your business network is at risk…now, more than ever. According to PhishMe, the number of phishing emails that included ransomware rose to a record level of 97.25% during Q3 2016, up from 92% in Q1 2016. While email is still a leading risk when it comes to cyber security, there are many..

read more

What You Need to Know About Cyber Liability

On April 6th, 2017, posted in: Security Threats by Comments Off on What You Need to Know About Cyber Liability

Imagine for a moment that a well-developed community of cyber criminals have targeted your company. They’ve not only targeted, they’ve infiltrated your network. Cyber criminals have gained access to not only employee’s names and contact information, but also customer data. If your organization needs to remain HIPAA or SOX compliant, this translates into significant violations..

read more

3 Hot IT Trends in 2017 that Will Change the Way You Do Business

On January 13th, 2017, posted in: Security Threats by Comments Off on 3 Hot IT Trends in 2017 that Will Change the Way You Do Business

The New Year offers a blank slate for businesses to grow, reduce costs and boost productivity. By utilizing today’s technology, you can maintain a lean, agile, dynamic business that quickly adapts as your business needs change. Now more than ever, even small businesses can access the same enterprise-level technology that larger companies have been utilizing..

read more

Cyber Security Checklist: Is your Business at Risk?

On November 3rd, 2016, posted in: Security Threats by Comments Off on Cyber Security Checklist: Is your Business at Risk?

It happens all too often. Small to mid-sized businesses make the assumption that they’re not a target – that cyber criminals aren’t interested in their data. But the truth is, cyber criminals ARE interested in customer/employee financial and identity related information from businesses of all sizes. So why are small to mid-sized businesses at greater..

read more