5G: The Race is On

In the United States, the four main wireless carriers are rolling out 5G services. Find out what they are offering and how fast their 5G service might be. The race to 5G has started in earnest around the world. In the United States, the four main wireless carriers — AT&T, Sprint, T-Mobile, and Verizon — […]

Read More

CCPA is Now in Effect. Are you Compliant?

On January 1st, 2020 the California Consumer Privacy Act (CCPA) went effect for new consumer privacy rights. This empowers consumers with more power against larger businesses selling their data. Is your company affected by this new law, and if so, are you compliant? This new law is designed to protect and educate California consumers in […]

Read More

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder to detect while it is encrypting files. Cybercriminals have been using a ransomware variant known as Snatch to encrypt files on Windows computers since 2018. Recently, researchers at SophosLabs discovered that […]

Read More

4 Trends to Track in 2020

It is important for companies to keep track of IT developments that can affect their businesses. Here are four trends to watch in 2020. The IT world changes often. While it would be impossible to keep abreast of every change that occurs, knowing about and keeping track of important IT developments is important. This information […]

Read More

Flaws in Qualcomm Chipsets Are Leaving Android Devices Vulnerable

The Qualcomm chipsets in many Android smartphones have vulnerabilities that could let cybercriminals gain access to passwords and other highly sensitive data stored in the devices. Here is what you need to know about these flaws. Cybercriminals access the area where passwords, fingerprint scans, payment card numbers, and other highly sensitive data are stored. Check Point […]

Read More

Two New, Unconventional Ransomware Programs Might Be Coming Your Way

Two new ransomware variants — AnteFrigus and PureLocker — made the rounds in November 2019. Learn why these programs caught the attention of security experts. Although numerous ransomware variants exist, they often exhibit common behaviors and use similar tools and techniques. But that’s not the case for two variants discovered in November 2019. AnteFrigus and […]

Read More

Online Holiday Scams & How to Protect Your Data

December is the busiest shopping month of the year with several gift giving holidays within. Companies send out more email volume during this time to past purchasers or potential buyers and hackers are aware of this busy shopping season and will attempt to steal your information. Earlier this month, the Department of Homeland Security issued a release […]

Read More

CCleaner: A Tale of Two Attacks

CCleaner has been the target of hackers twice in the last three years. Here are several lessons that you can learn from these attacks. CCleaner — a popular app designed to clean up unused data, unnecessary settings, and other leftovers that can make computers run slower — was the target of hackers once again. In 2017, […]

Read More

New Firefox Version: Another Look

Mozilla has released version 70 of its Firefox web browser. Find out the main changes the company made to better protect your privacy. Mozilla released version 70 of its Firefox web browser in October 2019. Its push this year has been building privacy-centric features that are enabled by default in its products, according to company officials. […]

Read More

5 Things You Should Know about Phishing

The more you know about phishing, the better you will be able to spot phishing attacks. Here are five phishing fundamentals that can help you avoid becoming the next victim. Only 66% of working adults correctly answered the question “What is phishing” in 2019 Proofpoint survey. This means one-third of adults do not know that phishing […]

Read More

Using Strong Passwords Is Not Always Enough to Prevent Cyberattacks

Using unique, strong passwords is not always enough to prevent hackers from attacking your company. Learn about a better way to protect your online accounts and ultimately your business. Cybercriminals commonly use compromised passwords in cyberattacks. For example, in ransomware attacks, compromised passwords have now surpassed phishing scams as the No. 1 way to gain […]

Read More

How Using E-Signatures Can Help Your Business

Electronic signatures are as legally binding as handwritten signatures. Find out how they can improve productivity and cut down on paperwork. Governments around the world recognize electronic signatures (e-signatures) as a legal way to sign a document. For example, e-signatures have the same legal standing as physical signatures in the United States, thanks to the […]

Read More

New Android Ransomware Spreads Through Forum Posts and Customized Texts

Cyber extortionists have created new ransomware that encrypts files on Google Android devices. Find out how this ransomware infiltrates devices so you can avoid becoming a victim. A new family of ransomware known as Android/Filecoder.C has been discovered. The initial infection occurs when Google Android device users download a malicious app by means of a […]

Read More

Mac OS Tips for Windows Users

If you are a Windows user and need to make the switch to MacOS, it can seem difficult at first to navigate with the slight differences between the two operating systems. Here is a quick list of shortcuts and explanations for the MacOS system to make the transition easier. The Dock Like the Windows Taskbar […]

Read More

Equifax to Pay up to $425 Million to People Affected. Are you Included?

In 2017 Equifax publicly announced that a data breach occurred and exposed personal information of 147 million people. Find out if you’re eligible to claim benefits. The Federal Trade Commission posted information about the settlement late July on its website and encourages claims to be filed immediately. The credit-check company, Equifax, has reached an agreement […]

Read More

5 Ways to Protect Your NAS Device from Ransomware

Network-attached storage (NAS) devices are common targets of ransomware attacks. Find out why NAS devices are often attacked and what you can do to protect your storage device and the data in it. Small and midsized businesses often use network-attached storage (NAS) devices for file sharing, storage, and backups. Because these devices are used to […]

Read More

5 Common Misconceptions about Hybrid Clouds

The concept of a hybrid cloud is still hazy in many people’s minds. Here are five common misconceptions about hybrid clouds set straight. Despite being introduced back in 2011, the concept of a hybrid cloud is still hazy in many people’s minds. This is understandable given that there are many misconceptions about what hybrid clouds are and how […]

Read More

5 Ways You Can Better Protect Your Windows 10 Computer Thanks to the May 2019 Update

More than a billion adults have been the victims of cybercrime. Here are five security-related improvements rolled out through the Windows 10 May 2019 Update that can help you avoid becoming the next victim. People fear cyberattacks more than physical attacks or robbery — and for good reason. More than 1 billion adults have been the victims of cybercrime, […]

Read More

Save Time by Setting Up Rules in Outlook and Gmail

Slogging through numerous emails every day takes time. Declutter your Inbox by taking advantage of Microsoft Outlook’s and Google Gmail’s filtering functionality. If you are like most people, you receive numerous emails at work. Employees receive an average of 126 emails per day, according to one study. Having to slog through that many emails takes time […]

Read More

Is Your SaaS Data at Risk?

Companies that assume their SaaS provider will restore application data they accidentally lose are risking permanently losing that data. Learn why SaaS providers are not required to restore this data and what you can do to avoid permanent data loss. Software as a Service (SaaS) is the largest segment of the cloud computing market, with […]

Read More

SaaS, IaaS, and PaaS: What’s the Difference?

You have probably seen the acronyms SaaS, IaaS, and PaaS before, but do you know what they mean? Discover what these acronyms represent and, more important, the differences between them. The IT industry is embracing the shift from ownership-based business models to service-based ones. Vendors are increasingly offering their hardware, software, and other IT products […]

Read More

Watch Out for This Direct Deposit Scam

Cybercriminals are trying to scam businesses into depositing employee paychecks into their bank accounts. Learn about the variations of the scam and what you can do so that your business does not become the next victim. Most companies use direct deposit to pay their employees. In the United States, for example, more than 80% of workers have […]

Read More

Don’t Let Your Phone Stalk You

Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone. The idea of someone tracking your whereabouts and eavesdropping on your conversations can be unsettling. Yet, more than 58,000 Google Android users had this happen to them. That’s because these individuals had stalkerware installed on their smartphones. […]

Read More

All It Took Was 52 Seconds for Hackers to Attack a Poorly Secured Server

Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect your devices. Companies often enable Secure Shell (SSH) in servers, network attached storage (NAS), and other devices so that users can remotely access them. Security experts highly recommend using […]

Read More

Software Supply Chain Attacks Are on the Rise

Software supply chain attacks are becoming more widespread. Learn what they are and how they occur so you can develop a strategy to help manage the risks. The statistic is alarming. Software supply chain attacks increased by 78% in 2018, according to Symantec’s “2019 Internet Security Threat Report“. And security experts expect the number of […]

Read More

Debunking 4 Common Myths about Complying with Data Privacy Regulations

The General Data Protection Regulation (GDPR) protects the data privacy rights of European Union citizens, while the California Consumer Privacy Act (CCPA) gives California residents more control over their personal data. Similarly, the Health Insurance Portability and Accountability Act (HIPAA) safeguards the medical information of US citizens. Regulations that protect people’s privacy and data rights […]

Read More

What You Need to Know about Foldable Phones

Foldable phones have been stealing the tech spotlight recently, but are they really all they’re cracked up to be? Here is what you need to know to make up your own mind. Thanks to new offerings from Samsung and Huawei, foldable phones have been making a comeback. These mobile devices are smartphone-tablet hybrids. Vendors are […]

Read More

Are Your Employees Inadvertently Exposing Your Company’s Sensitive Data?

The ease in which employees can now share information coupled with current cultural trends is causing accidental data leaks in many businesses. Learn how to prevent employees from accidentally exposing your organization’s sensitive data. The number is eye-opening: 83% of companies believe that employee errors have put sensitive business and customer data at risk of […]

Read More

Malvertising Is Likely Coming to a Browser Near You

Cybercriminals are increasingly posting malicious ads on legitimate websites to obtain data and spread malware. Discover how malvertising works and what you can do to protect your business from it. Cybercriminals do not take holidays off — in fact, they often use them to their advantage. That’s how a group of hackers celebrated President’s Day […]

Read More

6 Ways to Make Your Passwords Easy to Crack

Passwords are an important line of defense against cyberattacks, yet many people make it easy for hackers to crack them. Here are six mistakes that people often make when creating passwords. Serious consequences can result from cracked passwords. Cybercriminals might use them to steal money or data from the compromised accounts. Or they might change […]

Read More

7 Ways to Spend Less Time Dealing with Emails

Business professionals often spend a lot of time reading and responding to emails every day. If you are one of them, here are seven ways you can reduce the amount of time you spend dealing with emails. In many businesses, employees use emails to communicate with each other, customers, suppliers, and other business associates. And […]

Read More

What Is Digital Transformation and Why Are Companies Pursuing It?

Digital transformation is a popular topic of discussion in boardrooms. Learn what digital transformation is all about and why companies are interested in digitally transforming themselves. IDC predicts that at least 55% of organizations will be digitally transforming themselves by 2020. But what exactly is digital transformation? More important, why are companies pursuing it? What “Digital […]

Read More

Don’t Let Your IT Policies and Procedures Fall by the Wayside

IT policies and procedures are not “set and forget” documents. Discover why they need to be reviewed regularly and learn some tips on how to do so. Businesses sometimes create IT policies and procedures and then forget about them. Reviewing IT policies and procedures is important for several reasons, including: Keeping IT systems running optimally. Companies create […]

Read More

Reputation Jacking: Another Trick Up Hackers’ Sleeves

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses. Cyber criminals have another trick up their sleeves. Besides using phishing emails to steal money and data from businesses, some hackers are now employing an additional technique known as reputation-jacking — using popular, legitimate cloud […]

Read More