Category Archives: Security

Bring your own device

The Pros & Cons Of BYOD In The Workplace

Do the Advantages Outweigh the Risks for Your Business? With 77% of Americans now owning a smartphone, one thing is certain: there are plenty of personal devices in the workplace. As a result, the Bring Your Own Device (BYOD) movement is gaining traction as many businesses embrace the trend.

the dark web

Hackers, Passwords and the Dark Web: What You Need to Know

Criminals love stealing credentials, and too many people are handing them the keys to the kingdom. A recent study by Verizon showed that 91% of phishing attacks targeted the user’s credentials. Why? Because stealing your username and password is the easiest way to break in to your business data, your bank account and more.

Credit card skimming

Credit Card Skimming: What You Need to Know

With all the discussion around cybercrime and phishing attacks, we know that pesky Nigerian princes or long-lost millionaire relatives are out to steal our money. We probably don’t suspect the ATM at the convenience store down the street. Unfortunately, ATMs and points of sale aren’t always safe, as more and more thieves are using credit card skimmers to steal credit card information.

top 5 worst IT blunders of 2016

The Top 5 Worst IT Blunders of 2016

Last year was a year filled with security gaffes, data breaches, and hacks—many of which were felt country and even nationwide. Well-known organizations such as Yahoo, the NSA, and the IRS each had to deal with their own security breaches that found millions of user accounts compromised or exposed to malicious third parties. Everything from login details to personally identifiable information (PII) was released or obtained by hackers in 2016; but the attacks didn’t stop with just looted data.

6 tactics to combat high level it security threats

6 Tactics to Combat High-Level IT Security Threats

The number of cyber-attacks and security threats across the country and throughout the globe has gone up – but there’s an even more critical problem businesses should worry about. The complexity and threat-level of those security breaches have increased, becoming more sophisticated. It’s increasingly more common for hackers to target larger companies—oftentimes, many at once. Today’s malware tends to have many different attack vectors compared to malware five or ten years ago. This means IT security is even more integral now to the overall health and integrity of your company’s data infrastructure.

Insider threat rises for data breaches

Insider Threat Rises for Data Breaches

Data breaches have been a challenge to many businesses over the past twenty years. Cyber criminals have held files for ransom, leaked personally identifiable information (PII) to third parties, and turned millions of dollars’ worth of hardware useless. The threat of being exposed to hackers has always been a fear in the minds of computer users; however, there’s a threat as insidious lurking somewhere much closer to home.

HummingBad infects over 10 Million android devices

HummingBad Malware Infects Over 10-Million Android Devices

More than 10 million Android phones have been infected with an annoying little piece of malware called HummingBad. This malware looks to exploit a device’s data by stealing and selling it. While its tactics are fairly run-of-the-mill for malware—drive-by-download, data theft, etc.—HummingBad goes a step further by attempting to root itself.

new mobile threats to business apps

New Mobile Threats to Business Apps

Mobile apps have made the lives of employees everywhere infinitely better, and more efficient, as enterprises lean towards virtual offices and establish BYOD policies. Apps designed for the business sector or that improve productivity have steadily risen over the last couple of years. The disadvantage to relying on these helpful apps to get work done lies in their inherent vulnerability to security threats such as malware.