Statistics for cyber security during 2016

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]

Easy tips for preventing a costly data breach

If you’ve read this blog before, you already know security is paramount to the success of any small business. We cover the ever increasing cases of security violation in big and small businesses, as well as national and international organizations where data, applications, networks, devices and networks have been illegally accessed by unauthorized people. But […]

Why Telephony and VoIP attacks continue

When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types of attacks you need to be on the lookout for. Companies that utilize Voice over Internet Protocol (VoIP) systems are also vulnerable to another type of attack. One of the biggest threats to these systems […]

Cyber-crime and social engineering

Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in terms of cyber security this usually means passwords and bank information. Criminals are using social engineering to gain access to your business and its network by exploiting employees who often don’t have a clue about […]

How Fantom is haunting unsuspecting users

It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

5 security measures made easy

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help. […]

Healthcare trends to watch for in 2016

As 2015 came to a close, there are several trends in the healthcare industry that medical researchers and practitioners need to be aware of in 2016. According to PwC Health Research Institute, patients will be on the lookout for better ways to manage their health and medical expenses. Technology is also expected to play a […]

Twitter alerts users to cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

Discover what you can do to strengthen your cloud data’s protection from loss and cyberthreats. Download our free eBook today to learn how!Download here
+ +