X

Blogs

We had a client that needed a conference room TV that was fast and portable. This was our solution.
Read More
“The next Pearl Harbor will be Cyber! It’s a cheap way to attack! No bombers or submarines needed. We must do much more to protect our infrastructure from attack. ” - Senator Angus King, Maine. The idea that we must protect our businesses from a dark nefarious shadowy threat that lurks beneath the surface of the Internet paints a scary picture of the threat we all face. ......
Read More
“In the most widespread attack to date, the WannaCryptor (WannaCry) ransomware family infected thousands of computers across the world. In just 24 hours, the number of infections spiked to 185,000 machines in more than 100 countries."  * picture from KnowBe4 A new family of ransomware called WannaCryptor has started targeting businesses in more than 70 countries around the world. Hospitals, telecom companies or gas and utilities plants are just some of the verticals tha...
Read More
There are new developments on the cyber-attack front every day. New forms of social engineering, malware, viruses, and cyber-attacks are being developed faster than we can comprehend. Cyber-criminal enterprises have learned that data is as valuable to business as physical assets. Stealing from or disrupting business operations is lucrative and relatively risk-free. In the murky world of the darknet, criminal enterprises conspire to find ways to steal anonymously. Brad Chacos, senior editor ...
Read More
We hear and read about cyber security every day. In fact we hear and read about it so much across so many platforms that it has become just another annoyance in our daily business lives. It’s just something else that may happen to us if we aren’t aware and don’t buy the latest software, tool, or appliance. The cyber security business is growing rapidly and the products, services, information and terminology we are confronted with is complicated and confusing. If you are tired o...
Read More
Published: November 16th, 2016By:  Charles Paikert - senior editor with Financial Planing, a SourceMedia publication IBDs: Keep your head — or some IT supervision — in the cloud.Independent broker-dealer Lincoln Financial Securities found out the hard way what happens when an OSJ’s cloud server vendor fails to protect customer information from hackers.As part of a FINRA enforcement action, the Fort Wayne, Indiana-based firm agreed to a censure and a $650,000 fine for ...
Read More
You have been attacked! Your files are encrypted. A screen pops up with instructions telling you that your files will be destroyed if you don’t comply. The clock is ticking down. What do you do? Unfortunately, ransomware attacks are on the rise globally. Attackers have learned that small to medium sized businesses are prime attack targets. It’s a numbers game to cyber criminals. Why take the risk of attacking a Fortune 500 company and asking for thousands of dollars when it easi...
Read More
If you can’t see it, it doesn’t exist, right? When an ostrich senses danger he buries his head in the sand. In fact, he doesn’t, it’s an old wives tale that still sticks today, but it has spawned a few theories that psychiatrists call the “Ostrich Effect.” Apparently, the ostrich effect is prevalent in humans. It is our natural instinct to avoid unpleasant or difficult news or situations. It’s the “out of sight out of mind”, “if you don...
Read More
From Fortune 500 companies to SMBs, everyone knows that technology changes constantly. Depending on your industry 18-24 months may be the lifespan of your technology.  Most SMB’s are quick to research price and performance details before the purchase of a new laptop, desktop, or server. We all want the most power and speed for the best deal. Makes sense right? Security software and virus protection is a completely different story. Small and medium businesses typically buy anti-vi...
Read More
It could be a Hollywood movie title. “Attack of the Botnet”No a botnet is not a giant fang flashing dinosharktapus towering over a city of millions destroying buildings and wreaking havoc on innocent citizens. A botnet is a network of computers infected with the same malware controlled remotely by a hacker. Thousands of computers and devices may be infected at the same time creating an army of zombies at the control of a cyber criminal for the purpose of distributing spam, malware, a...
Read More
Page 1 of 3 FirstPrevious [1]23 Last