Data Breach

Petya Ransomware: Is your data at risk?

Petya Ransomware: Is your data at risk?

A new ransomware named Petya hit high-profile targets in multiple countries, including the United States, on Tuesday. Tens of thousands of infections have been reported globally, just one month after the WanaCry outbreak.

How to stay safe and secure online in 2017

How to stay safe and secure online in 2017

One of the few industries in the world that will never see budget cuts is security. As the world grows ever more complex and connected, our valuable information is increasingly exposed to malicious actors around the world.

7 Ways to Secure Your Smartphone

7 Ways to Secure Your Smartphone

Smartphones are so small and portable that it is easy to forget that you have a powerful computer in your pocket or purse. However, they are increasingly becoming the target of theft, ransomware, viruses, and other types of malware.

4 IT Trends That Will Affect Businesses in 2017

4 IT Trends That Will Affect Businesses in 2017

There is no crystal ball that businesses can use to see the exact IT problems and opportunities that they will encounter each year. However, by looking at past and present IT trends, they can get a sense of where IT is heading and how the new direction might affect their business.

How to Avoid Getting Spyware on Your Computer

How to Avoid Getting Spyware on Your Computer

Using spyware, hackers can record your keystrokes, take pictures of your desktop, read your emails, make copies of your files, and much more. Spyware is a type of malware that runs in the background, without your knowledge. It collects information about your activities on the computer, sending the data to hackers through your Internet connection.

5 Ways to Protect Your Data in the Cloud

5 Ways to Protect Your Data in the Cloud

Cloud computing is now the norm — 95 percent of businesses worldwide are using at least one cloud service, according to a 2016 study. While there are many services that fall under cloud computing, businesses often use the cloud to store data.

5 Ways Your Employees Might Be Putting Your Business at Risk

5 Ways Your Employees Might Be Putting Your Business at Risk

Employees can be your most valuable asset — and your biggest security nightmare. Sometimes, they engage in risky behaviors without even realizing they are doing so. Taking work home, for example, might seem innocent enough, but it can put holes in your security defenses.

Cybercriminals Now Using Legitimate PayPal Emails in Scam

Cybercriminals Now Using Legitimate PayPal Emails in Scam

PayPal scams are nothing new. What is new is that cybercriminals have started using legitimate PayPal services to perpetrate those cyberattacks. In July 2016, cybercriminals sent legitimate PayPal emails to PayPal members in an effort to scam them out of $100 USD as well as infect their computers with malware.

Crysis Ransomware Infects Windows, Mac, and VMware Machines

Crysis Ransomware Infects Windows, Mac, and VMware Machines

The Crysis ransomware is quickly yet quietly spreading to businesses across the globe. Even though it is more common and destructive than the Locky ransomware, Crysis has not received nearly as much press attention.

Why You Might Want to Reset your Apple ID Security Questions and Answers

Why You Might Want to Reset your Apple ID Security Questions and Answers

If you have an Apple device, you know that your Apple ID is priceless. With it, you can buy music from the iTunes Store, log in to iCloud, and access many other Apple products and services. If you forget the password portion of your Apple ID, you can simply provide your email address and answer a few security questions to reset it

Why Malvertising Might Show Up on Your Favorite Website

Why Malvertising Might Show Up on Your Favorite Website

The notion that your computer might get a malware infection when you simply visit one of your favorite websites might be enough to give you nightmares. But it is a very real possibility. Cybercriminals are increasingly posting malicious advertising, or malvertising, on legitimate websites in order to spread malware.

9 Signs That an Email Might Be a Phishing Scam

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing scams, digital con-artists use a convincing pretense to lure you into performing an action — usually opening an attachment or clicking a link.

How to secure your laptop fleet

How to secure your laptop fleet

When the corporate network proves difficult to penetrate, hackers start looking for softer targets. This can include laptops your employees use to access the work network.

BACK UP DON'T PAY UP!

BACK UP DON'T PAY UP!

When it comes to ransomware, it’s not the ransom that’s so damaging to your business. It’s the downtime.  Just ask the folks at Hollywood Presbyterian Medical Center.

How to Protect Your Business from the Locky Ransomware

How to Protect Your Business from the Locky Ransomware

As TrendMicro predicted, hackers are increasingly using ransomware to encrypt businesses' files and hold them for ransom. As a result, headlines about these attacks abound in print and electronic media, making them seem almost routine.  In 2016 there have been over 40 new families of crypto ransomware discovered.

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

Hospital Pays Hackers a Ransom to Regain Control of Its Computers

February 5, 2016, started out like any other day for the doctors, nurses, and other staff members at the Hollywood Presbyterian Medical Center in Los Angeles, California. But by the end of the day, many of them could no longer access or update patients' medical records. Nor could they send or receive emails. When the hospital's IT department investigated, it found that the computer systems were infected with ransomware.