Most business owners worry that their employees aren't as focused on work as they should be. Advances in technology have made it possible to accurately ...
Brent Whitfield, CEO of DCG Technical Solutions, recently served as a guest author for Tripwire, which delivers threat, security and compliance solutions. In his article, Whitfield explains how cyber crime has hit the mainstream with readily available exploit lists, downloadable network tools, scripts, and even hacking IT support, and what precautions business owners can take to avoid dangerous cyber attacks.
When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of everyone’s time. After all, employees must have working computers and IT professionals are expected to resolve any technology issues.
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.
Brent Whitfield, CEO of DCG Technical Solutions, Inc., served as a guest blogger for StaySafeOnline.org, a website that educates the global digital society on how to use the Internet safely and securely. In his blog, Whitfield discusses the website's STOP. THINK. CONNECT.™ guidelines for IT security, which include using a clean device and auto updates to ensure users' systems are running the most current software.
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent.
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.
Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and.
Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure.
There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger.