SPAM & PHISHING Cybercriminals have become very savvy in their attempts to lure people in and get you to click on an infected link or to open an infected attachment. The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business.It often
This is an important question to ask when you have a business full of computers, servers and employees. “What will I get with managed services that I couldn’t get with a break-fix solution?” Information Technology (IT) systems are expected to meet high standards of operation, while offering 24/7 availability, security, and performance. In today’s environment,
2015 SMB IT Cyber Security Threats Cyber security experts expect cyber security threats to intensify in 2015, with innovative & complex attacks. Cyber crime is profitable and the risks for the criminals to be caught or punished are still negligible. 2015 is likely to see more copycat crimes as well as increased sophistication in attacks.
Just a quick note & reminder on how to easily protect your information on your mobile phone. Generally these will apply to pretty much any smartphone… Simple: 1) Enable a passcode in order to unlock and use the phone. 2) Don’t allow apps to remember passwords, instead type them all in manually. 3) Enable wiping
A client recently asked us this question, and I wanted to share our response. The short answer is that it depends on what you’re using it for. Each platform has it’s benefits for certain scenarios. Many business run 100% on Mac, others 100% Windows, and some even have a hybrid of the two. Below is
eBay has recently admitted that it was hit by a cyberattack which compromised user passwords (and non-financial data). The problem with these attacks is that many users have the same password for multiple sites. Meaning a smart hacker could deduce other account passwords with just one. The attack was first detected two weeks ago, but
I constantly see people’s Facebook posts, emails and tweets about how their email/twitter/facebook/google/yahoo/bank account/whatever got hacked. I want to outline how people typically get hacked and what you can do to prevent that. I’m going to try to number these in order to make it clear and concise. 6) Having inadequate antivirus/protection Arguably, this could