Protecting small firms from computer disasters
Cart 0

Blog — cybersecurity

How to Protect Your Identity

cybersecurity fraud

How to Protect Your Identity

What can you do to reduce the chances that your private information will be breached by thieves and fraudsters?

Read more →


2019 Top Cyber Threats

cybersecurity

2019 Top Cyber Threats

Cybercriminals continue to produce innovative ways to harvest money, tricking and cracking into computers across the globe. Here are trends to watch. Top Cyber Threats in 2019 WipersWiper malware wipes drives clean, destroying everything on them. Motives of those who spread them include covering up tracks after stealing sensitive files and records.Fileless MalwareFileless Malware evades traditional signature-based antivirus software by writing nothing to the drives of attacked computers. The malware exploits vulnerabilities in web browser and PDF software or launches from phishing emails. Fileless malware attackes doubled in the first half of 2018 according to SentinelOne and are sure to...

Read more →


2FA Hacked - Backups Even More Critical

cybersecurity vulnerabilities

2FA Hacked - Backups Even More Critical

Two-Factor Authentication (2FA) is designed to protect you by sending you a text message or calling you when you are logging into a website. A new hacker trick can defeat 2FA.

Read more →


New Computer Flaws Discovered

cybersecurity vulnerabilities

New Computer Flaws Discovered

Newly discovered flaws allow attackers with access to a computer the ability to bypass passwords and read protected data.

Read more →


Worst Year Ever

cybersecurity fraud

Worst Year Ever

2017 marked another "worst year ever" in data breaches and cyber incidents. Here's what to watch out for and what you can do about it.

Read more →