The curse of Chimera ransomware

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims out of their hard-earned cash.

Security rules for SMBs to follow

Security rules for SMBs to follow

While small businesses lack the big budgets of their enterprise counterparts, that doesn’t make security any less of an issue for SMBs. In fact, small and medium businesses are more and more often the target of cyber criminals precisely because they generally have fewer security measures in place.

Best browser extensions for privacy

Best browser extensions for privacy

Protecting your privacy online is crucial in today’s world to avoid data breaches, malware attacks, and other mischief hackers can throw your way. The easiest way to do this is through browser extensions, but the question is which is best? Here, we’ll take a look at the most popular browser extensions that promise to protect your online privacy.

What to do when your PC abruptly slows down

What to do when your PC abruptly slows down

You just got back from lunch and are settling down into your office chair. You open up your planner to check your schedule, and then wake your PC from sleep. Time to check emails. But wait, something’s wrong. You’re…waiting. Your computer is moving as slow as a brontosaurus and the problem appears to go deeper than internet speed.

Your data is not secure – negligence and glitches create 64% of breaches

It turns out that despite what you think, your critical corporate data is most likely not very secure. Negligence and glitches create 64% of data breaches - More than a third of intrusions are pegged to malicious attacks in Ponemon/Symantec report.

A recent study from Symantec and The Ponemon Institute revealed that even though the big Cyber Attacks get all the headlines, the reality is that the a significant number of data thefts are the result of employee negligence or system glitches.

BYOD Management – Employee Devices + Corporate data = Big Risk?

One question we are getting lately from many customers lately is how to manage the influx of employees' devices that can connect to the corporate network. We call this phenomenon BYOD, or Bring Your Own Device. The device can be a smartphone such as an iPhone or Android, a tablet like the iPad, or even a home PC or laptop.