How virtualization roots out malware

Every IT solution in your organization will encounter malware at some point or another. Some solutions are malware liabilities, others…

Homographs: the newest trend in phishing

So much of cybersecurity depends on adequate awareness from users. Phishing for example, preys on people’s fears and desires to…

Should you fear government surveillance?

Accusations of inappropriate government surveillance have been swirling after Wikileaks recently released thousands of pages supposedly detailing the CIA’s exploitation…

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have…

Fileless malware is back, are you at risk?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last…

How can you go from reactive to preventive IT?

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and…

Managed services for cyber security

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the…

Security breaches: tips for prevention

As long as businesses host valuable data, cyber criminals will continue to bypass the security protocols meant to protect this…

Falling for it: youth and tech scams

As long as there have been salesmen, there have been scammers trying to sell useless products. Traditionally the elderly have…

Social engineering and personal security

The technology of crime is evolving, and criminals get smarter every day. But when technology proves too difficult to exploit,…