Entries by Jonathan Green

, , ,

Cybersecurity: 5 Reasons Why Attacks Happen

Cybersecurity, and the mistakes we make. Cybercrime has quickly become a major problem for home users, businesses and governments all over the world. This is because, according to Pew Research Center’s 2017 Report, far too many people are still making the same old, basic cybersecurity mistakes. While many have been making strides to become more […]

, , ,

Ransomware: WannaCry – What to do after the attack.

On Friday, May 12 2017, the largest cyber security incident in history impacted over 150 countries. It successfully compromised hundreds of thousands of computers and corporate networks. This ransomware attack started in Asia and spread across Europe, where it proceeded to infect computers in the US and South America. Experts project the attack could have had […]

, , ,

Data Breach: 7 Tips to Protect Against Cyber Threats

According to Verizon’s 2017 Investigations Report, most data breaches affect businesses with 1,000 or fewer employees. The percentage is staggering; 61% of all data breach victims are businesses with 1,000 or fewer employees. To get a better perspective of cyber crime in 2017, Verizon answered some key questions in their report: Verizon’s 2017 Data Breach […]

, ,

Why reboot? You’re giving your PC a fresh start.

It’s no secret that restarting your computer fixes a lot of problems, but have you ever wondered why? Read on to reveal the magic behind the reboot.   For all issues: Reboot first This might come off as too-easy-of-a-solution, but go ahead and restart your computer. Yes, let’s flush out the ubiquitous eye-rolling that is associated to restarting […]

, , ,

Need computer tech support? Try these techniques first.

Whether you’re dealing with your work laptop at home or your dad’s old computer, needing computer tech support is a part of our daily lives. Before you make that support call, why not try your hand at being your own tech support? Here are some of the most common problems IT professionals fix—and how you can do it […]

, , ,

Phishing Emails – 10 Tips on How To Identify an Attack

Phishing emails have cost businesses $3.1 billion since January 2015. What’s the main reason for this compromise? Untrained users. For example, many of us forget to pay attention to the “from” field in emails, one of the biggest tell-tale signs of a phishing attack. Verizon’s 2016 Data Breach Investigations Report found that targeted phishing emails […]

, ,

Software Updates Keep the Hacker’s Away

Pop-Up Software Updates We all know those notorious software updates. They seem to pop up when we’re doing something really important. So we click on that convenient “Remind Me Later” button and continue on. But of course, we’re reminded later, so we click on that “Remind Me Later” button again. And the cycle continues… When […]

, , ,

Securing Your Home Network

Feel Confident Your Family is Using the Internet Safely in Your Home Network   Most households have a plethora of Internet devices. These may include laptops, desktops, TVs, gaming consoles, tablets and phones. Just like your work devices, it’s  important to protect your home devices from unwanted cyber threats, as your home network is also susceptible to these […]

, , ,

Small Businesses = Latest Target for Hackers

Out of all small businesses that have been breached, a staggering 60% go out of business after six months. So, why do hackers prey on small businesses? Listed below are the reasons why they have become the latest targets. They Are Less Protected Than Larger Businesses Small businesses have less cyber security protection and resources than […]

, , ,

Why Scammer’s Love Email Addresses

Does your website contain a contact list of email addresses? If it does, chances are you and your coworkers are probably receiving large amounts of SPAM. What can we do to prevent this unwanted and potentially harmful email? We generally don’t think of our email addresses as targets, in fact we tend to give them […]