Our Blog

November 23, 2020

NSA Releases list of what Chinese Hackers are Hacking Right Now

The U.S. National Security Agency (NSA) recently published a list of the top publicly known vulnerabilities Chinese state-sponsored hackers exploit, several of which affect Microsoft and […]
November 19, 2020

This Microsoft Office Feature is a Time-Saver

If you work with a lot of information, there are times when you need to copy information from one file to another. Microsoft Office is a […]
November 12, 2020

Linux Users Should Be On High Alert For Drovorub Malware Attacks

Linux OS is perceived to have fewer security vulnerabilities than systems like Windows. However, that doesn’t mean users shouldn’t remain alert to the threat of Drovorub […]
November 9, 2020

WordPress Sites at Risk from Critical Flaw

WordPress sites running the File Manager plugin are being hounded by hackers, thanks to a critical vulnerability found in some of the plugin versions. Find out […]
November 5, 2020

What You Need to Know about the Zerologon Vulnerability

A critical vulnerability in the Microsoft Netlogon Remote Protocol is leaving some companies open to attack. Here is what you need to know to determine if […]
November 2, 2020

Smishing and Vishing and Whaling — Oh My

Smishing, vishing, and whaling might sound ominous, but they are simply terms used to describe different types of phishing attacks. Find out how these attacks differ […]
October 29, 2020

3 Basic Security Blunders That Many SMBs Are Still Making

Many small and mid-sized businesses (SMBs) are still making some basic mistakes when it comes to securing their organizations. Here are three of them.
October 26, 2020

New Tactic Is Bringing Ransomware Extortion to a Whole New Level

Cybergangs continually look for new ways to make their ransomware campaigns more effective, but sometimes they just seem to fall in their lap. Learn how ransomware […]
October 22, 2020

Securing Facial Recognition Data and Potential Risks

As federal agencies and local law enforcement continue to use facial recognition to probe for potential suspects it is also considered to be an invasion of […]