What Happened with SamSam You may recall the SamSam outbreak, which stretched from 2015-to-2018 and racked up $30,000,000 in damages across 200 entities. This large
- No Comments
Managed Services
Comprehensive IT Support
vCIO
Network Security
Unified Threat Management
Fully Hosted Security as a Service
Cloud IT Solutions
Cloud Backup & File Sharing
Microsoft Azure
What Happened with SamSam You may recall the SamSam outbreak, which stretched from 2015-to-2018 and racked up $30,000,000 in damages across 200 entities. This large
Double Pulsar could be used to install additional malware on a target PC. At the time the threat could only be leveraged against 32-bit operating
These numbers, by the way, come from a cybersecurity firm, as neither the federal government nor the Federal Bureau of Investigation track these kinds of
These solutions include a unified threat management tool, a Bring Your Own Device policy, and a virtual private network solution. Unified Threat Management A unified
January Blur A January 2nd data breach of an unsecured server at a password management company called Blur exposed a file containing the personal information
Here, we’ll review the various scams that frequently appear on social media to help you better identify problematic content on your feeds. Many of these
Then there is the story that came out of the College of Saint Rose in New York’s capital city of Albany early in April, 2019.
Outdated devices and software increase risks of malware infections due to the fact that devices are susceptible to vulnerabilities that have yet to be patched.
First, let’s take a quick tour of the types of malware you may run into. Viruses: These act very similar to the flu virus. Once
External ThreatsWith technology at the forefront of most businesses, external threats are becoming the benchmark for social engineers. They can hack into core business processes
The first thing that we should mention in this article is that Windows 7 will be losing support this upcoming January, and with so many
The Criteria Ask yourself the following questions about your messaging application: Are my messages encrypted (and how encrypted are they)? How transparent is the application
The late American author Kurt Vonnegut once wrote, “New knowledge is the most valuable commodity on earth. The more truth we have to work with,
The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force
Data security isn’t a matter to be taken lightly, as too many businesses have found out the hard way. Unfortunately, there are far too many