Beware This Legacy Security Hole

One of the most common ways for hackers to attack any individual or company is through email. And once a hacker gains access to your email, they can often gain access to many other parts of your business. So locking down your email with appropriate modern security measures is a very easy and powerful step in preventing an initial breach.

ASUS Computer MegaHack

Most hacks affect one computer at a time, and the hackers are thrilled with each new success. But imagine a hack that was so clever that it infected almost a million computers all at once. That is what happened to owners of ASUS desktop computers and laptops in a hack that was discovered a full 6 months after it began, which allowed many more computers to be violated.

Simplify and Separate Your Network

These days, more and more businesses are doing more and more things on the internet. Phones, video surveillance cameras, and other devices have become almost as popular as the computers sitting on every employee’s desk. But if you have all of these devices all sharing the same internal network, you might be endangering your ability to conduct business, your online security and the physical security of your entire facility.

Should You Move To The Cloud?

Is your business growing? That’s great news! But often business growth comes with its own set of challenges. You might need bigger offices, new desks and…new technology. But if you think back to when you last bought servers for your business (and everything that went with it), you might remember that it was a very expensive investment.

Are You Prepared For Business Continuity

What would you do if you lost $145 million? File for bankruptcy is a likely answer. Here’s a better question: What would you do to prevent losing $145 million? The answer to that second question is apparently “nothing” for a Canadian cryptocurrency exchange called QuadrigaCX. They recently filed for bankruptcy because their company founder and CEO passed away while on a business trip, and he was the only person who had the encryption keys for $145 million in cryptocurrency that his exchange was holding for its clients.

The Death of the Mac Malware Myth

Do you have Mac computers in your office? A lot of companies use them because there’s been a myth for a long time that Macs were more secure than PCs. “There’s no malware for Macs,” the old saying goes. And while that used to be true, it’s far less true these days.

The New Era of Cyber Security

Protecting your computer networks and your data is getting more and more difficult. Cyber criminals are getting more sophisticated, and the attacks that they create are more creative than ever. If they can’t install a trojan-infected file on your computer, they create a file-less attack.