Is your data safe from the Facebook data breach?

Thanks to social media, businesses can stay in close contact with their customers and while also attracting new ones. But what happens when one of these platforms doesn’t guard the information you’ve given it? How does this affect its users? Last month, news broke that a firm known as Cambridge Analytica collected private data from […]

Things you didn’t know about virtualization

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating a robust backup system in […]

Protect your Facebook data with these 3 steps

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your Facebook data The thought of […]

Cybersecurity protocols to protect PHI

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired certified technicians, but that’s not enough. They also need to implement the most advanced systems and protocols to reinforce their work, namely: Routine […]

Gearing up for phishing scams in tax season

As tax season looms, so do phishing scams. For cybercriminals, this is the ideal time of year to deceive unsuspecting individuals into releasing sensitive private or company information. Businesses must therefore take extra precautions between now and April 17th to avoid hackers from selling your confidential data in the dark web. Phishing baits to watch […]

How Fantom is haunting unsuspecting users

It’s hard to deny how quickly the different types of ransomware multiply — they do so faster than rabbits during mating season. Ransomware vary in appearance, subtlety, and targets. The latest addition to the extensive list of ransomware varieties is Fantom. This cybersecurity nightmare adopts a facade that many would have no qualms trusting. Like […]

Ecommerce: Squarespace adds new analytics

There are quite a few content management systems (CMS) available for small and medium sized businesses to market themselves on the internet, all working to maximize the value of their features and eliminate gaps in service. One of these, Squarespace, has made a big splash with the addition of their ecommerce analysis functions. When choosing […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +