Tag: cyber security

cybersecurity attacks
IT service providers are now focus of cybersecurity attacks

IT service providers are now focus of cybersecurity attacks

Most IT service providers are used to being the defenders of the cybersecurity realm. But, a new report published today by Trustwave, a managed security services provider (MSSP), suggests services providers themselves are increasingly becoming the targets of cybersecurity attacks....

/ April 5, 2018
cyberattack on CPAs
2018 will be the year of the targeted cyberattack on CPAs

2018 will be the year of the targeted cyberattack on CPAs

April tax deadlines are looming, and that means accounting firms are neck-deep in returns as everyone races to file on time. While accountants are focused on deductions and earned income credits, bad actors are watching and waiting, ready to pounce...

/ March 28, 2018
More organizations starting to come to terms with need for cybersecurity help

More organizations starting to come to terms with need for cybersecurity help

When it comes it cybersecurity an increasing percentage of IT organizations are starting to realize they are pretty much sitting ducks. A survey of 1,300 IT and security professionals conducted by CyberArk, a provider of privileged account management software, finds...

/ March 6, 2018
cyber crime
5 Tips to help keep your SMB customers safe from cyber crime

5 Tips to help keep your SMB customers safe from cyber crime

Data Privacy Day has been and gone; however, its message lives on. As well as being an awareness day, it also commemorates the January 28, 1981, signing of Convention 108: the first legally binding international treaty dealing with privacy and...

/ February 28, 2018
Internet of Things security
Cyber Security: Are you forgetting the Internet of Things

Cyber Security: Are you forgetting the Internet of Things

If you haven’t noticed the huge ransomware risk that has swept the globe in recent months, you must have been living under a rock. You know all about human error and the importance of internal access segregation, and you’ve probably...

/ February 14, 2018
threat detection
Threat detection emerges as major opportunity for MSPs

Threat detection emerges as major opportunity for MSPs

Threat detection appears to be all the rage when it comes to IT security. Both Amazon Web Services (AWS) and Google are becoming much more focused on providing threat detection services. In the case of AWS, that means acquiring sqrll,...

/ January 25, 2018
Happy99 worm
Tech Time Warp: The Not-So Happy99 Worm

Tech Time Warp: The Not-So Happy99 Worm

The email users of January 1999 were an innocent bunch. Fresh from seeing “You’ve Got Mail” at the box office, they received emails with the attachment Happy99.exe and thought nothing about double-clicking. One rather lame “fireworks” display later, most of...

/ January 19, 2018
data breaches
The most telling cyber-attacks and data breaches of 2017

The most telling cyber-attacks and data breaches of 2017

You’re not imagining things if it feels like you saw more headlines in the past 12 months about massive cyber-attacks and big companies being breached than you did in the past. 2017 was a year that saw ransomware become a...

/ December 29, 2017
Cyber Security
What is a phlashing attack?

What is a phlashing attack?

Throughout the past year, our inboxes and RSS feeds have been flooded with news about malware and ransomware. But what about phlashing attacks? Phlashing attacks have been designed by hackers with one sole purpose: to infect and permanently damage —...

/ April 11, 2017