Mac lovers have touted multiple advantages over Windows-based machines for years. These claims haven’t always been substantiated by real data, sure… but folks love Apple computers and have for a while now. One of the advantages claimed for years and years is that Macs are less vulnerable to hacking, ransomware, malware, etc. While that may have been true a decade … Read More
How the news endangers your company’s security
The news media catches a lot of heat for a lot of different reasons. Much of that is justified, some of it not so much. But regardless of where you fall on that particular ideological spectrum, if you own a business, the news can be a huge threat to your cybersecurity and IT reliability. Wait… what? I know, I know. … Read More
The FireEye hack shows just how vulnerable everyone truly is
Whenever a company or government is hacked, they usually call a cybersecurity forensic company to investigate: who did it, how did they do it, why did they do it, what were they after, and how do we protect ourselves going forward? One of the preeminent players in this space is FireEye — they’re experts on state-backed hacking (especially Russia) as … Read More
Phishing attacks are more cunning than ever — what to watch out for
Despite the massive coverage of phishing attacks in the business press, industry press and more general press, it’s still one of the most prevalent ways hackers steal passwords. While consumers and employees alike are getting somewhat better at identifying phishing attempts, so too are hackers getting more advanced in constructing elaborate phishing schemes. The hardest place to identify phishing emails? … Read More
CoVid-19 phishing scams are on the rise — what to know
No event in living memory (unless you’re 106 years old) has impacted daily life across the globe as completely and deleteriously as CoVid-19. The coronavirus and its disease have upended every facet of daily life for basically everyone in this country. Every child is home schooled now; every office is at home unless you’re an essential worker (our thoughts, thanks … Read More
How OpenDXL Ontology could change your technology stack
One of the most common subjects on this blog is cybersecurity. It’s by no means all we do as a managed IT provider; but, when your #1 goal is uninterrupted uptime for your clients, security breaches rank pretty high on the list of things we have to watch out for. It’s also the space within our industry that sees the … Read More
SIM swapping: what you need to know about this growing threat
If you’re like most Americans, you probably don’t really interact with SIM cards all that much any more. Unless you’re traveling abroad and need to swap a SIM card out to connect to that foreign network, you might not even know where the SIM card is on your iPhone or Android device. But, that simple, tiny piece of plastic could … Read More
Multi-factor authentication bypasses increasing, but you should still use it
For years, cyberattacks have been increasing in frequency, scope and sophistication. From multibillion dollar disasters crossing international borders to run-of-the-mill ransomware, enterprises have to be more vigilant than ever to protect their data and their bank accounts from malicious actors. One of the primary lines of defense? Multi-factor authentication (or MFA for short). Going beyond just passwords to unlock sensitive … Read More
Flipboard suffers data breach, responds expertly
Data breaches, sad as it is to say, are a part of corporate life now. Despite the best laid intentions (and expertly designed security systems) no system is truly hack proof. As long as humans have logins, there will be vulnerabilities in sensitive systems. That doesn’t mean you shouldn’t do everything in your power to prevent them, obviously, but it … Read More
WhatsApp vulnerability threatens billions of users—what you need to know
WhatsApp promises users end-to-end messaging encryption, but the app has a massive vulnerability. What your business needs to know, and lessons to learn:
Dive straight into the feedback!Login below and you can start commenting using your own user instantly