From Our Clients

You will not find anyone better than this!

Mickey H.

Blog

HomeBlogAll Posts
9 10, 2017

The hurricane survival guide for today’s businesses

October 9th, 2017|Categories: Backup & Recovery, Blog, Business Continuity, Disaster Recovery|

Depending where your business is located, the risk attached natural disasters can vary. To help, here is a survival reference guide to ensure your business can weather any storm. Since it is hurricane season, let's use hurricanes as a point of reference for this guide. Hurricanes and tropical storms wreak havoc through a combination of [...]

15 09, 2017

Equifax poised for another Equifax security breach due to insecure database credentials

September 15th, 2017|Categories: Blog, Security|Tags: , |

Researchers from US firm Hold Security investigating Equifax after the recent Equifax security breach exposing details of 143 million customers have said its Argentine arm is also easily hackable. It appears Equifax security measures are nothing but sloppy after revelations that its Argentinian database has 'admin' as both the username and password. An employee portal, [...]

31 08, 2017

A Canadian university lost $9.5M in an online phishing scam

August 31st, 2017|Categories: Blog, Security|

A Canadian university says staffers unwittingly lost $9.5m (C$11.8m; £7.5m) in an online phishing scam. Phishing emails convinced staff at MacEwan University that a client was changing its bank account details. The staff then paid money into the fraudulent account. Since the online phishing scam, the university, located in Alberta, Canada, is auditing its business [...]

21 08, 2017

Cyber criminals target victims by making them install Chrome extensions

August 21st, 2017|Categories: Blog, Blog Posts, Network Security, Security|

In these recent attacks cyber criminals target victims using social media networks, specifically those individuals inside financial organizations and those who make financial transactions. These victims were then called using the phone by the attacker posing as bank employees, who then used social engineering tactics to trick the victim to install an "update" to the bank’s [...]

1 08, 2017

Is an effective business web site more than just a pretty face?

August 1st, 2017|Categories: Blog, SEO, Web|Tags: , |

Properly positioning your company on the web is a critical step to acquiring new customers or engaging new users. Whether you have a free movie website, a church website, or a small business web site, it is a fact that most people cannot help but judge a company or service they find on the web [...]

31 07, 2017

Hackers target users of Copyfish, a Chrome extension, to show Adware

July 31st, 2017|Categories: Blog, Security|Tags: , |

As in previous example of ransomware attacks, cybercriminals usually go straight for the end users. There are times however, they take a less direct approach, as they did with an adware campaign that targeted Google Chrome users. Copyfish is a translation plug-in for Google Chrome. By no means is it one of the most used [...]

26 07, 2017

Data breaches are up 29 percent over last year

July 26th, 2017|Categories: Blog, Security|

According to a report released by the Identity Theft Resource Center and CyberScout, data breaches are running 29% above last year. Hacking was the leading cause of data breaches nationwide, more than 790 so far this year. Although two-thirds of data breach notifications or public notices did not report the number of records compromised, more than 12 [...]

17 07, 2017

Two more Cybercrime-as-a-Service Platforms Discovered

July 17th, 2017|Categories: Blog, Security|Tags: , , , , , |

With the rise in dependability on technology and on the internet, cybercrime is also on the rise. To meet the demand, there is a rising trend of social engineering sites on the dark web, which make malicious hacking a point-and-click exercise. You read correctly, you can now pay for a service to help you [...]

10 07, 2017

Businesses must learn to combat cyber attacks

July 10th, 2017|Categories: Blog, Blog Posts, Security|

After two recent ransomware cyber attacks disrupted businesses, factories, hospitals and schools in over 150 countries, there are many lessons to be learned. The WannaCry ransomware was developed to take control of system data. It encrypted files as soon as the virus became active and demanded a ransom to be paid via Bitcoin, a cryptocurrency [...]

28 06, 2017

GoldenEye / Petya ransomware triggers massive attack worldwide

June 28th, 2017|Categories: Blog, Security|Tags: , , , |

A massive attack, triggered by a version of the GoldenEye or Petya ransomware is currently claiming victims around the world. Unlike other families of ransomware, #GoldenEye does not encrypt individual files, but rather the entire hard disk drive. It then reboots it to prevent the user from accessing that information. When the encryption process is complete, [...]

Load More Posts