Hybrid clouds give flexibility to SMBs

Most people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation allows SMBs to have the best of both cloud worlds while minimizing […]

Read More

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security […]

Read More

Microsoft Office 365 ravaged by ransomware

The Internet is a powerful platform that brings people together on a global level while giving them access to a wealth of information anytime they please. With the good, comes the bad – some utilize their skills in committing cyber crimes from the comfort of their own homes. Case in point, the recent Cerber ransomware […]

Read More

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and […]

Read More

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s […]

Read More

5 tricks for thwarting VoIP threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your SMB. Let’s examine 5 five […]

Read More

Are your site’s images hiding an attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to […]

Read More

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you […]

Read More

Improved email security for Office 365

No matter how much technology advances, human error has always been a fact of life. Nowhere is this more pertinent than when it comes to email security as many of today’s breaches start in an employee’s inbox. But now Microsoft is looking to change this. In the coming weeks, the technology giant intends to launch […]

Read More

Tips to monitor employee activities online

When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring. And if […]

Read More