News

October 17, 2017

How Former Employees Can Pose a Big Threat to Your Data

Data breaches instigated by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant […]
October 17, 2017

Backup as a Service (BaaS) vs. Recovery as a Service (RaaS): 2 Major Distinctions

It seems like everything has the “as-a-Service” designation after it these days. As-a-Service products are changing the way companies procure and manage their IT. Two of […]
October 10, 2017

Locky Ransomware Is Back in a Big Way

After taking a brief hiatus, cybercriminals launched four new Locky ransomware attacks in August 2017. The biggest one occurred on August 28. In a span of […]
October 10, 2017

What You Need to Consider before Adopting a BYOD Policy

Companies often let employees use their own devices for work. One study by Crowd Research Partners found that 72% of the 800 companies surveyed allow at […]
October 10, 2017

5 Ways to Protect Your Web Browsing Data Now That ISPs Can Sell It

If you live in the United States and you are using a U.S.-based Internet service provider (ISP), you need to know about an important change made […]
October 6, 2017

What You Need to Know about the Equifax Data Breach

In September 2017, Equifax announced that hackers stole the personal data of 143 million U.S. consumers, making it the biggest data breach in 2017 and the […]
October 6, 2017

5 Myths about Ransomware Debunked

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. […]
October 6, 2017

How Hackers Can Infiltrate Your Network through Your Printers

Many businesses connect their printers to a network so that multiple employees can use them to print documents. If all-in-one printers are networked, employees can also […]
September 26, 2017

This Tech Support Scam Can Trick You into Calling a Fake Hotline

Your phone rings. As soon as you say "Hello", the caller identifies himself as a tech support staff member from a well-known tech company. He tells […]