9 essential cybersecurity phrases

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come to the right place.

Ransomware adopting self-replication

Ransomware adopting self-replication

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

The Value of Unified Threat Management

The Value of Unified Threat Management

Unified Threat Management, often referred to as UTM is the deployment of multi-layered threat protection technologies to create the strongest barrier against malware, virus attacks, external attacks, and phishing scams. Recently, we had the distinguished honor of being featured in a case study by OpenDNS,  a world leader in threat intelligence and protection.

How is BYOD a security risk?

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

How to find out if your computer has a virus

How to find out if your computer has a virus

Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If these problems keep occurring then your computer may have a virus. So is there a way to prevent things like this from happening again? While there are various antivirus solutions you can take, it’s best to know how malware affects your computer first so you can quickly recognize and deal with the problem.

Cyber threats and the finance sector

Cyber threats and the finance sector

The financial services industry has long been a heavily targeted sector by cyber criminals. The number of attacks that involved extortion, social-engineering and credential-stealing malware surged in 2015. This means that these institutions should strive to familiarize themselves with the threats and the agents behind them.

Privacy Protection through Browser Extensions

Privacy Protection through Browser Extensions

Even if you’re not currently taking adequate steps to protect yourself (and your company!) when you’re using the Internet, deep down you know you should be. Or maybe you already think you have enough precautions in place – but can you ever be too careful? In these times of Internet fraud, phishing scams and high profile hacks, there has never been a better time to take another look at your online safety.

The curse of Chimera ransomware

The curse of Chimera ransomware

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims out of their hard-earned cash.

Your data is not secure – negligence and glitches create 64% of breaches

It turns out that despite what you think, your critical corporate data is most likely not very secure. Negligence and glitches create 64% of data breaches - More than a third of intrusions are pegged to malicious attacks in Ponemon/Symantec report.

A recent study from Symantec and The Ponemon Institute revealed that even though the big Cyber Attacks get all the headlines, the reality is that the a significant number of data thefts are the result of employee negligence or system glitches.