We’re all accustomed to hopping on wireless networks whenever we can—saving data use on our mobile devices. And we appreciate when the office or coffee shop or school makes it easy for us to connect any time we visit. For most organizations, offering guest Wi-Fi access is a must. But is having a simple password enough to keep company data safe?
Category: Cybersecurity – Detection and Response
You may have heard about the Spectre and Meltdown security vulnerabilities recently. While there’s no evidence of anyone exploiting the security flaw, we want to make sure our clients are aware of how it’s being resolved.
Forbes just released a compilation of 60 cybersecurity predictions for 2018. While no one can predict the future, we’re sure that cybersecurity is going to stay in the headlines and at the top of our list. We’ve curated the predictions most likely to interest or impact our clients’ organizations here:
NBC News recently shared this report about schools in Columbia Falls, Montana that were targets of a cyberattack. Hackers accessed students personal data—social security numbers, phone numbers—and threatened to release that data and hurt children unless a ransom was paid. The hackers also accessed school security cameras and could watch everything going on. This school district lies in a quiet town at the foot of Glacier National Park, showing that threats can affect any organization, anywhere.
Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher on all the latest trends and buzzwords used in the cybersecurity sector.
Ever been infected by malware or a virus? For most internet users, the answer is probably yes. But what is the difference between all the cyber threats out there? What makes a virus different from a trojan or worm? And how can you protect your critical data and your business from these threats? If you’ve never been able to answer these questions, here’s the the different types of malware explained.
Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you need to protect. So let’s take a closer look at 4 types of hackers and their motives.
As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection. So how do you know if your company’s IT security is under threat? Here are a few warning signs to tell if you are a victim of malware infection.
With technology changing so rapidly, it’s easy to get caught up in outdated beliefs. And when it comes to Disaster Recovery, far too often do we see business owners still clinging to ideas that no longer apply. So, what kind of DR myths are still widely accepted by the masses? Here are three that need to be retired into IT folklore.