105, 2019

Tips for removing malware from your Android device

By |May 1, 2019|Categories: Android|Tags: , , , , , , , , |

The Android operating system is open source, which makes customization and app development easy. The problem is that cybercriminals can also access Android’s programming code, find vulnerabilities, and distribute malware through app stores. Here are some things you must do to avoid an infection. Confirm the malware infection Android devices [...]

3110, 2018

Don’t be a VoIP eavesdropping victim

By |October 31, 2018|Categories: VoIP|Tags: , , , , , , , , |

In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping. Ensure that you [...]

2610, 2018

Is your IT security proactive?

By |October 26, 2018|Categories: Security|Tags: , , , , , |

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you [...]

2704, 2017

Five tips to prevent VoIP eavesdropping

By |April 27, 2017|Categories: VoIP|Tags: , , , , , , , , |

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cybercriminals have had [...]

1502, 2017

What exactly is preventive cyber-security?

By |February 15, 2017|Categories: Security|Tags: , , , , , |

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive [...]

Go to Top