A Year in Malware – The Nastiest Malware of 2022

A Year in Malware - The worst malware of 2022

A Year in Malware – The Nastiest Malware of 2022 Much of our time this year has been spent working with our clients, making sure they’re ready to fend off newly emerging cyber threats or malware strains. So to look back at the year, we thought we’d round up what many experts agree has been the … Read more

How Do Tech Support Scams Happen?

How Do Tech Support Scams Happen?

Tech support fraud involves criminals claiming to provide technical support to fix problems that don’t exist. Their methods include placing calls, sending pop-ups, engaging misleading lock screens, and sending emails to entice users to accept fraudulent tech support services. Users should NOT give control of their computers or mobile devices to any stranger offering to … Read more

What Is Ransomware and Why Is It a Threat?

What Is Ransomware and Why Is It a Threat?

What Is Ransomware? Ransomware dominated the news cycle this past week with cybercriminals’ attack on the Colonial Pipeline, which resulted in a disrupted gas supply and widespread gas shortages along the East Coast. Let’s define what ransomware is and explain why it is a threat. Next week, return to this blog. We will help you … Read more

The Pros and Cons of Social Media in the Workplace, Part 2

    GUEST BLOG By Daniel Dimov InfoSec Institute In Part I of this two-part blog exploring the pros and cons of social media in the workplace, I explored the advantages of restricting social media access for employees.  In this second part, we explore the disadvantages. Disadvantages of restricting social media access for employees There … Read more

The Pros and Cons of Social Media in the Workplace, Part 1

  GUEST BLOG By Daniel Dimov InfoSec Institute Employees using social networks such as Facebook and Google+ may not only waste a lot of their working time, but also spread viruses on their work computers. Due to this, some employers have implemented security systems designed to closely monitor or restrict, as needed, an employee’s access … Read more

10 Dangerous Risks to Your Server Security

Server security. That’s usually the first thing on the minds of those in the IT world. To keep up with changing technologies, we are constantly changing and improving our security standards, so that we can remain one step ahead of malicious attackers in defending our confidential information. Royce Howard, of Global Knowledge, offers some tips … Read more