2011, 2019

Simple tips to prevent Mac ransomware

By |November 20, 2019|Categories: Apple|Tags: , , , , , , , |

High-profile ransomware cases include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, Mac computers can get ransomware too. If you have a Mac, it’s important that you follow the security best practices below. What is Mac ransomware? Ransomware is [...]

2610, 2018

Is your IT security proactive?

By |October 26, 2018|Categories: Security|Tags: , , , , , |

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you [...]

2012, 2017

A keylogger found in HP laptops

By |December 20, 2017|Categories: Hardware|Tags: , , , , , , , , |

Are you using an HP laptop? If so, your machine might have a keylogger pre-installed. This means every stroke you hit on your keyboard can be recorded and your passwords and personal details can be exposed. But don’t panic. We’re about to tell you how to remove it while educating [...]

506, 2017

How HIPAA wards off ransomware threats

By |June 5, 2017|Categories: Healthcare|Tags: , , , , , , , , , , |

Hospitals and healthcare organizations are usually the first victims of malware attacks. WannaCry ransomware -- malicious software that encrypts files until the victim decides to pay the Bitcoin ransom -- took advantage of this when it hit several healthcare institutions last month. With more malware expected to target the healthcare [...]

2305, 2017

How to defend against WannaCry

By |May 23, 2017|Categories: Business|Tags: , , , , , , , , |

Both businesses and individuals across dozens of countries are scrambling to fix their computer systems after a ransomware, named WannaCry, caused major disruptions earlier this month. Like most ransomware, WannaCry encrypts files and demands a Bitcoin payment for their release. What’s worse, more WannaCry variants will likely be developed in [...]

2103, 2017

How to recover from ransomware in your Mac

By |March 21, 2017|Categories: Apple|Tags: , , , , , , , , |

While a vast majority of ransomware that’s been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new ransomware strain, OSX/Filecoder.E, which encrypts Mac files and keeps them locked even after the victims have paid the ransom. But don’t worry, there is still [...]

1502, 2017

What exactly is preventive cyber-security?

By |February 15, 2017|Categories: Security|Tags: , , , , , |

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive [...]

Go to Top