Phishing is an attack designed to trick Internet users into giving away confidential information, typically by sending an e-mail posing as a legitimate organization (like a financial institution) and linking to a website disguised as one associated with that institution.
Spear Phishing – Avoiding the Trap
Equifax’s Leak: lessons learned
No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.
How can ERP improve your business?
Small- and medium-sized businesses constantly struggle with different areas of business, whether it’s accounting, inventory, or strategic planning. This is because SMBs often lack the tools to manage these systems efficiently. However, enterprise resource planning (ERP) software can come in handy.
File Folder Sharing and Ransomware
Ransomware attacks continue to make headlines therefore, being proactive is critical. Hospitals, universities, SMBs and even government offices have found themselves a victim of these attacks. It is essential to take every precaution against Ransomware attacks, especially as they have become more and more frequent.
Office 365 threat comes with new techniques
If you're using Office 365, you wouldn’t want to miss this news: Online scammers are carrying out a highly customized spear-phishing campaign to steal Office 365 users' credentials and attack organizations internally. Get yourself informed and read on.
DR tips for floods and hurricanes
The trail of devastation left by Hurricanes Harvey and Irma has reminded us once again that coastlines and even entire regions of the country can be demolished by natural disasters. While catastrophes cannot be prevented, planning around them with a well-crafted disaster recovery (DR) strategy can help minimize the damages and keep your business alive.
Social engineering exploits Facebook
You’ve received a message from one of your Facebook friends. You click on the link not knowing what you’ve gotten yourself into. This describes one of the latest social media adware schemes, which has wreaked havoc on Facebook users worldwide.
What is it?
Little is known about the adware itself or those behind it, but it was uncovered by David Jacoby, senior security researcher at Kaspersky Lab, when he received a Facebook message from one of his friends, only to find out that wasn’t the case.
Beware of a new Locky-type ransomware
Disguising itself as an invoice proved to be an effective approach for the original Locky ransomware, which infected millions of users in 2016. Although it was mostly defeated, hackers are currently using a similar approach to spreading a new type of malware.
What is Amazon AppStream 2.0?
Managing applications on-premise is expensive and inefficient. Today’s workforce is now more mobile than ever before, which is why businesses are investing in remote access solutions so their employees can access applications and documents whenever and wherever.
Are all hackers out to do harm? Not so fast
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day.