3007, 2019

A primer on watering hole attacks

By |July 30, 2019|Categories: Security|Tags: , , , , , , |

Cyberattacks come in many different forms, with new methods being developed all the time. What’s bad is that personal information is now often stored online, be it through social media or through government and healthcare services — and these are juicy targets for criminals. Learn more about one way these [...]

2610, 2018

Is your IT security proactive?

By |October 26, 2018|Categories: Security|Tags: , , , , , |

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you [...]

1704, 2018

Beware of watering hole attacks!

By |April 17, 2018|Categories: Security|Tags: , , , , , , |

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering [...]

1502, 2017

What exactly is preventive cyber-security?

By |February 15, 2017|Categories: Security|Tags: , , , , , |

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive [...]

Go to Top