Protecting small firms from computer disasters
Cart 0

Blog — cybersecurity

Quick Steps to Computer Privacy

cybersecurity privacy

Quick Steps to Computer Privacy

These three quick steps can protect your privacy, keeping big companies from monitoring your behavior online.

Read more →


Cybersecurity Good News - Bitcoin Miners

cybersecurity malware

Cybersecurity Good News - Bitcoin Miners

The good news is that a major bitcoin mining service, CoinHive....

Read more →


How to Protect Your Identity

cybersecurity fraud

How to Protect Your Identity

What can you do to reduce the chances that your private information will be breached by thieves and fraudsters?

Read more →


2019 Top Cyber Threats

cybersecurity

2019 Top Cyber Threats

Cybercriminals continue to produce innovative ways to harvest money, tricking and cracking into computers across the globe. Here are trends to watch. Top Cyber Threats in 2019 WipersWiper malware wipes drives clean, destroying everything on them. Motives of those who spread them include covering up tracks after stealing sensitive files and records.Fileless MalwareFileless Malware evades traditional signature-based antivirus software by writing nothing to the drives of attacked computers. The malware exploits vulnerabilities in web browser and PDF software or launches from phishing emails. Fileless malware attackes doubled in the first half of 2018 according to SentinelOne and are sure to...

Read more →


2FA Hacked - Backups Even More Critical

cybersecurity vulnerabilities

2FA Hacked - Backups Even More Critical

Two-Factor Authentication (2FA) is designed to protect you by sending you a text message or calling you when you are logging into a website. A new hacker trick can defeat 2FA.

Read more →