Whether you are looking to install a business phone system or replace an old model with a new phone, you will need to understand the options that are ...
You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk.
Cybercrime is a complicated criminal act that targets computers or networks and can be debilitating to businesses small and large. It's imperative that business owners understand cybercrime and all of its forms.
Brent Whitfield, CEO of DCG Technical Solutions, Inc.
In 2003, a manager at the National Institute of Standards and Technology (NIST) authored a document on password best practices for businesses, federal agencies, and academic institutions. Now retired, the author admits that his document was misguided.
When there's a data security breach, IT professionals are tasked with stopping the threat using their trusted tools of the trade. Brent Whitfield, CEO of DCG Technical Solutions, wrote an article for Hakin9 in which he dissects a list of the crucial cyber security tools all IT pros need in the event of a breach.
When it comes to security, it’s better to be safe than sorry. But as the Equifax leak case has taught us, once a security breach does happen, it’s best not to be sorry twice. Read on so your business doesn’t experience the same fate as the giant, bumbling credit bureau.
With more than 100 million monthly active subscribers, Office 365 has attracted the attention of hackers who’ve revamped an age-old trick. This time, they come up with a highly targeted, well-crafted spear-phishing scam that’s even more difficult to identify.
Do you know where your sensitive data is and who has access to it at all times? Those whose answer is no run the risk of losing their vital data to the competition or people with fraudulent intentions. Statistics show that a large number of these data breaches were carried out by company employees, contractors or insiders.
In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers.
When a cyber security researcher stopped the spread of WannaCry, the headlines praised him as a savior. But just a few short months later he was in handcuffs for allegedly creating a piece of malware that steals banking information. Even if he is innocent, it’s important to understand the difference between white hat, black hat and even gray hat hackers.
You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded.