Blog
Get the latest developments in the IT sphere
Categories
Archives
Virtual DR for ransomware protection
The massive success of ransomware like WannaCry and Petya have spurred other cybercriminals to develop their own ransomware and sell it on the black market.
Beware of what you save in web browsers
Passwords are a double-edged sword. If you make them too simple, they’ll be easy to guess; if you make them too complex, they’ll be impossible
2017’s most valuable IT solutions
It’s the perfect time of year to evaluate last year’s technology investments and make adjustments for the year to come. Whether 2017 left you with
VPNs: Why you need them
Installing powerful antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, government agencies, and ISPs constantly monitoring
Equifax sheds light on incident response
What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked?
It’s time to redefine the word “hacker”
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings
Lessons learned from the WannaCry malware
WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability
This fake Google app is really a phishing scam
If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on
Sly phishing attack catching users off guard
You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com…right? Because if you’re not, you could