Securing Your Home Network

, , ,
Feel Confident Your Family is Using the Internet Safely in Your Home Network   Most households have a plethora of Internet devices. These may include laptops, desktops, TVs, gaming consoles, tablets and phones. Just like your work…

Small Businesses = Latest Target for Hackers

, , ,
Out of all small businesses that have been breached, a staggering 60% go out of business after six months. So, why do hackers prey on small businesses? Listed below are the reasons why they have become the latest targets. They Are Less Protected…
Email Security

Why Scammer’s Love Email Addresses

, , ,
Does your website contain a contact list of email addresses? If it does, chances are you and your coworkers are probably receiving large amounts of SPAM. What can we do to prevent this unwanted and potentially harmful email? We generally…

HIPAA Compliant – First Line of Defense for Medical Practices

, , ,
Running a medical practice is tricky in itself. But do you know what's even trickier? Making sure you don't lose it. Because the latest trend in ransomware is targeting medical facilities. That’s right, hackers are stealing medical records…

Top 10 Holiday Scams

, , ,
The holiday season is finally upon us! It’s time to roll out the holly, spread some joy, and give thanks by enriching our loved ones with gifts galore. But wait, not everyone wants to spread good cheer. In fact, this is exactly the time…

Four Threats that Attack Mobile Devices

, , ,
We are all aware that cyber threats such as viruses, malware, and phishing poses danger to our desktop computers. However, mobile devices have become a real target for hackers. A study by Network World shows that the average American touches…

Top 25 Most Popular (and Worst) Passwords

, , ,
Every year, SplashData - a Los Gatos, CA security applications and services provider, compiles a list of stolen passwords that are made public and sorts them in order of popularity. Below are the top 25 passwords of shame – brace yourselves.   …

Phishing Scams – Identifying Types and How to Prevent an Attack

, , ,
The Evolution: From Phish to Whale The continuing surge of phishing scams has been keeping businesses on their toes when it comes to safely operating their email accounts. The term, to phish, refers to attackers luring targets with bait via…

Ransomware – Identifying Types and Degrees of this Malware

, ,
Ransomware - This is your Nightmare You spent the last few weeks working on a critical report for your supervisor. You’ve researched, edited, and proofread it dozens of times, and have also passed it onto colleagues for review. You have…

5 Essential Tips to Prevent Your Business from Being Hacked

Every week, there are stories in the press about cyber-crimes against major companies. Yahoo, Dropbox and LinkedIn have all been targeted this year. For every one of these high-profile hacking cases, there are thousands of others being committed…