Ransomware adopting self-replication

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

The Value of Unified Threat Management

The Value of Unified Threat Management

Unified Threat Management, often referred to as UTM is the deployment of multi-layered threat protection technologies to create the strongest barrier against malware, virus attacks, external attacks, and phishing scams. Recently, we had the distinguished honor of being featured in a case study by OpenDNS,  a world leader in threat intelligence and protection.

How is BYOD a security risk?

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

How to find out if your computer has a virus

How to find out if your computer has a virus

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this from happening again? While there are various antivirus solutions you can take, it’s best to know how malware affects your computer first so you can quickly recognize and deal with the problem.

Cyber threats and the finance sector

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them.

Privacy Protection through Browser Extensions

Privacy Protection through Browser Extensions

Even if you’re not currently taking adequate steps to protect yourself (and your company!) when you’re using the Internet, deep down you know you should be. Or maybe you already think you have enough precautions in place – but can you ever be too careful? In these times of Internet fraud, phishing scams and high profile hacks, there has never been a better time to take another look at your online safety.

The curse of Chimera ransomware

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims out of their hard-earned cash.

Security rules for SMBs to follow

Security rules for SMBs to follow

While small businesses lack the big budgets of their enterprise counterparts, that doesn’t make security any less of an issue for SMBs. In fact, small and medium businesses are more and more often the target of cyber criminals precisely because they generally have fewer security measures in place.

Best browser extensions for privacy

Best browser extensions for privacy

Protecting your privacy online is crucial in today’s world to avoid data breaches, malware attacks, and other mischief hackers can throw your way. The easiest way to do this is through browser extensions, but the question is which is best? Here, we’ll take a look at the most popular browser extensions that promise to protect your online privacy.