Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and […]
Game Over: NBA team losses valuable data
Ransomware to begin self-propagation
One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns.
5 tricks for thwarting VoIP threats
The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your SMB. Let’s examine 5 five […]
Are your site’s images hiding an attack?
As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint.
Understand these 4 types of hackers
Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you […]
Improved email security for Office 365
No matter how much technology advances, human error has always been a fact of life. Nowhere is this more pertinent than when it comes to email security as many of today’s breaches start in an employee’s inbox. But now Microsoft is looking to change this.
The security risks of virtualization
While virtualization security is not often talked about, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to the success of your business. So what are some of the security risks posed by virtualization? And how can you mitigate them? Here are some answers you should consider.
Tips to monitor employee activities online
When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring.
Get Office 365 switch security right
The decision to migrate from an on-site SharePoint system to a cloud-based Office 365 solution isn’t one that most small or medium-sized businesses take lightly. In fact, though the popularity of Office 365 and other cloud-hosted platforms continues to soar, plenty of companies still have legacy SharePoint systems in place for at least part of […]
4 things you should know about the cloud
Cloud computing has proven to be a cost-effective necessity for small businesses. Owners can now breathe a sigh of relief as website hosting, email services implementation and online file storage have become easier thanks to the cloud. However, there are still many owners who remain misinformed about installing a cloud infrastructure at their company.