605, 2019

Keep healthcare data safe from hackers

By |May 6, 2019|Categories: Healthcare|Tags: , , , , , |

The healthcare industry is shifting their data to cloud services to serve their patients better and improve accessibility. This puts personal health information (PHI) and personally identifiable information (PII) at risk of getting stolen by hackers. Healthcare security experts believe that data breaches aimed at medical facilities are becoming more [...]

1110, 2018

4 types of hackers that may target SMBs

By |October 11, 2018|Categories: Security|Tags: , , , , , , , , |

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need [...]

1303, 2018

Government agency finds way to unlock iPhones

By |March 13, 2018|Categories: Apple|Tags: , , , , , , , , , |

Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they've found a way to unlock practically every iPhone available on the market. It appears to be a significant milestone for law enforcement and forensic specialists, yet it’s also a potential privacy issue for Apple customers. iPhone [...]

2701, 2017

Browsers leak sensitive info to hackers

By |January 27, 2017|Categories: Security|Tags: , , , , , |

The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all your details when logging on your social media accounts or when checking out your basket after e-shopping. On Chrome and Safari browsers, however, danger lurks when you rely too much [...]

906, 2016

Ransomware adopting self-replication

By |June 9, 2016|Categories: Security|Tags: , , , , , , |

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital [...]

2804, 2016

Different types of hackers defined

By |April 28, 2016|Categories: Security|Tags: , , , , , , , , |

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll [...]

2704, 2016

Ransomware alert for healthcare practices

By |April 27, 2016|Categories: Healthcare|Tags: , , , , , , , |

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look [...]

2104, 2016

New email security feature for Office 365

By |April 21, 2016|Categories: Office|Tags: , , , , , , , |

While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, however, is trying to change this. In the coming weeks, the technology giant plans to launch a new security feature for Outlook, but only if you’re an Office [...]

1304, 2016

How is BYOD a security risk?

By |April 13, 2016|Categories: Security|Tags: , , , , , , , |

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your [...]

803, 2016

Cloud myths debunked

By |March 8, 2016|Categories: Web & Cloud|Tags: , , , , , , , |

From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among businesses. In fact, it is almost impossible to find a company’s data center that does not employ cloud-based services of some kind. However, reported incidents of cloud hacks and [...]

Go to Top