End ransomware with virtual DR

Ransomware like CryptoLocker and WannaCry has become more sophisticated over the years. No wonder that more ransomware attacks are expected…

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal…

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use…

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial…

Do honest working hackers exist?

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to…

What hyperconvergence means for SMBs

Progressive SMBs are defined by how they use technology to achieve business growth. From acquiring new customers to managing suppliers…

5 Simple but effective cybersecurity tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately,…

Regularly evaluate your cybersecurity

Experts estimate that the global market for cybersecurity products this year will exceed that of last year. At first glance,…

Tips to reduce risks after a security breach

No company is completely safe from data breaches. For proof, look no further than companies like Yahoo, AOL, and Home…

Malware strain infects 200k more devices

Yet another global malware infection has been making headlines and the story just took a turn for the worse. When…