Two Factor Authentication: is an App, Email or SMS Safest?

Two factor authentication, also known as 2FA, is absolutely one of the best ways to protect your online accounts from hackers. However, since there are three main authentication methods, many...

Read More

What is Phishing, and is it Dangerous?

Of all the common cyberattacks we see, phishing is perhaps the most dangerous because there is no single, foolproof way to prevent it. Rather than ask, “What is phishing?” after you’ve already...

Read More

How Small Businesses can Combat Credit Card Fraud

Credit card fraud is on the rise, and, unfortunately, small businesses are top targets. No matter the type of product or service your business sells, it’s potentially susceptible to fraud. That’s...

Read More

DDoS Attack Survival Guide: is your Business Prepared?

Distributed Denial of Service (DDoS) can cripple a business’ internet and technology operations indefinitely. Even scarier, it’s almost impossible to prevent a DDoS attack from taking place....

Read More

The Complete Security Breach Recovery Guide

No company is too big or too small to stay off the radar of hackers and cybercriminals. So whether you’re experiencing a security breach right now or just preparing for the worst, it’s important...

Read More

5 Common Types of Viruses you Should Know About

Computer viruses have been around since shortly after the internet’s inception. While virtually everyone is aware of their existence, few people are familiar with the types of viruses and how they...

Read More

WannaCry Ransomware: What is it, and how do I Stop it?

The outbreak of the ransomware, known as WannaCry, has quickly become one of the worst cyberattacks in recent memory. On Friday, May 12, 2017, it began infecting thousands upon thousands of...

Read More

The Top 4 Most Terrifying Computer Viruses

A while back we wrote a blog that discussed the inception and evolution of computer viruses. We focused on the ones that were the most important in terms of outlining how modern viruses, malware...

Read More

5 Commonly Overlooked Information Security Risks for Businesses

Many businesses are blissfully unaware of the information security risks that plague them. If you’ve never been stressed about the safekeeping of your business’ data, this blog may change that.

Read More

Ransomware Attacks now Target Remote Desktop Protocol

Ransomware has gained serious notoriety over the last few years. Bugs like CryptoWall and Locky have claimed countless victims through a variety of tactics, particularly spoof emails. But...

Read More
1 ... 2 3 4 5 6