The Windows XP Patch Doesn’t Equate to Security

Windows XP reached end of life in 2014, meaning Microsoft stopped issuing critical security updates for it. However, that hasn’t stopped people from using it. Hackers have been exploiting it like...

Read More

Fileless Malware Attacks: What are They, and How Do You Stop Them?

Traditional, run-of-the-mill malware usually makes its way onto a victim’s computer via the download of an infected file. However, that’s not always the case. Fileless malware attacks use tools...

Read More

New Ransomware Relies on PayPal Phishing

An unfortunately clever new form of ransomware uses a PayPal phishing page in an attempt to steal your credit card information. Learn about this cyberattack to recognize it and avoid being scammed...

Read More

What You Need to Know about Latest DocuSign Scam Email

Hackers have done a pretty good job at impersonating DocuSign, a leading electronic signature company that many businesses rely on. Learn how to recognize and fight a recent DocuSign scam email...

Read More

What is Sandboxing Software, and why is it Important for Cyber Security?

When it comes to keeping your business protected, a holistic, integrative approach to cyber security works best. This should include sandboxing software that quarantines and analyzes threats.

Read More

How to Create a Strong Password in 2019

A strong password is crucial to preventing hackers from stealing personal and business data. Use these rules to improve your password strength and keep hackers away.

Read More

Why You Need to Watch for Spear Phishing Attacks

Phishing is a dangerous cyberattack that seeks to prey on unsuspecting victims. Spear phishing attacks are even scarier and more dangerous. Learn how to identify and prevent them from compromising...

Read More

Why New Technology isn’t Always More Secure

You’d be hard-pressed to find someone who doesn’t view innovation as a good thing, and we’re no different. However, it’s important to understand that with new technology comes new cyber security...

Read More

HIPAA Compliance: A Basic Summary

The Health Insurance Portability and Accountability Act (HIPAA) mandates that health care organizations protect the privacy of patients’ personal information. Maintaining HIPAA compliance requires...

Read More

What are Vulnerability Scans and Penetration Testing?

The security of your company’s network is not something that should be taken lightly. You may know by now that small, local businesses are no safer from hackers than large businesses. Cyber...

Read More
1 2