Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: […]

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization. US government approved The NSA maintains […]

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different. Ransomware review Ransomware […]

How virtualization roots out malware

Every IT solution in your organization will encounter malware at some point or another. Some solutions are malware liabilities, others are assets. When it comes to virtualization, there are several cyber security benefits for improving your malware readiness. One of our favorites is called sandboxing, and it’s a good one for you to know about. […]

Homographs: the newest trend in phishing

So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up. Read on to […]

Should you fear government surveillance?

Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation of compromised devices and applications. But in today’s climate, every headline needs to be taken with a grain of salt. Read on to find out what’s actually at stake and why you probably don’t need […]

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands. The state of […]