Our Blog

May 7, 2018

How to Protect Your Business from Credential Stuffing Attacks

Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks […]
May 3, 2018

How to Make Your WordPress Website Harder to Hack

Websites built on the WordPress platform are at medium to high risk of being attacked. Find out what you can do to make your business’s WordPress […]
April 30, 2018

Business Email Scams Are on the Rise

Sophisticated email scams designed to con companies out of money and sensitive data are on the rise. Learn how to avoid falling victim to these scams.
April 26, 2018

SamSam Is on the Loose and Headed for a Server Near You

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware […]
April 19, 2018

How to Get the Biggest Bang Out of Your Cloud Services Buck

Companies often turn to the cloud to save money, but many of them are spending more than they need to on cloud services. Find out why […]
April 16, 2018

HP and Fujitsu Recalling Lithium-Ion Batteries Due to Fire Hazard

The batteries in some HP and Fujitsu mobile devices are defective. Learn how to check whether your device is affected and what to do if you […]
April 12, 2018

Running Acrobat Reader? Make Sure Security Update APSB18-02 Is Installed

Adobe released a patch that fixes more than 40 security vulnerabilities in Acrobat Reader and Acrobat. Here is what you need to know and do.
April 9, 2018

PDF Files: Handy for Businesses — and Hackers

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.
April 5, 2018

7 Ways Small Businesses Can Take Full Advantage of Office 365

If you subscribe to Office 365 Business Premium or Microsoft 365 Business, you have access to seven apps designed for small companies. They are part of […]