Whether you are looking to install a business phone system or replace an old model with a new phone, you will need to understand the options that are ...
The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat.
When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.
Brent Whitfield, CEO of DCG Technical Solutions, recently served as a guest author for Tripwire, which delivers threat, security and compliance solutions. In his article, Whitfield explains how cyber crime has hit the mainstream with readily available exploit lists, downloadable network tools, scripts, and even hacking IT support, and what precautions business owners can take to avoid dangerous cyber attacks.
When your employees seek your IT security staff’s help to fix their personal computer (PC) problems, it’s often perceived as a productive use of everyone’s time. After all, employees must have working computers and IT professionals are expected to resolve any technology issues.
No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.
Brent Whitfield, CEO of DCG Technical Solutions, Inc., served as a guest blogger for StaySafeOnline.org, a website that educates the global digital society on how to use the Internet safely and securely. In his blog, Whitfield discusses the website's STOP. THINK. CONNECT.™ guidelines for IT security, which include using a clean device and auto updates to ensure users' systems are running the most current software.
As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent.
Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam.
Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and.