There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.
What exactly is preventive cyber-security?
Fruitfly: the latest Apple malware
For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration, but there is a bit of truth to it. However, if you’re using Apple devices in your organization, you can’t afford to take this exaggeration for granted.
Up your cyber security game with managed services in 2017!
Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.
Five tips to avoid a security breach
If you’ve read this blog before, you already know security is paramount to the success of any small business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, devices and networks have been illegally accessed by unauthorized people.
Young workers are more gullible to tech scams
The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now they’re taking their tactics to the computer generation, and it can be surprising just who is falling for the new tech-related fraud. Read on to find out how scam artists are targeting the younger generation […]
Denial of service attacks on VoIP systems
When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack.
Social engineering and cyber security
Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about […]
Fantom: the latest cybersecurity spectre
It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom.
5 simple but manageable security measures
Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help.
Twitter warns about cyber attacks
Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]