Beware of sneaky Microsoft Office malware…

Beware of sneaky Microsoft Office malware…

Cybersecurity systems are getting better at identifying and preventing attacks coming from all directions. At the same time, hackers are coming up with new ways to bypass these systems. While online scams are the most common ways to do this, cyber-criminals have discovered a new attack method using Microsoft Office.

The History of Hacking: Are all hackers out to do harm?

The History of Hacking: Are all hackers out to do harm?

The days of  home-organized hacking led by thrill-seeking teenagers are gone. Learn how hackers are changing the world.
Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple.

The Top 6 Reasons Small Businesses Outsource Cybersecurity

The Top 6 Reasons Small Businesses Outsource Cybersecurity

Outsource cybersecurity: Small businesses are working smarter by managing their network security through a service provider.

A chaotic 2017 has seen several cybersecurity meltdowns, so far. If you'd like to get caught up, read "The Biggest Cybersecurity Disasters of 2017 So Far" There is an epidemic taking place in the world of technology today.

Checklist – Know These Types of Malware to Stay Protected

Checklist – Know These Types of Malware to Stay Protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

IT Security Risks that SMEs Cannot Afford to Ignore

IT Security Risks that SMEs Cannot Afford to Ignore

When it comes to IT security threats, no business is immune to them. However, large enterprises have the luxury of information and resources to reduce the chances of being hit by ransomware, hackers, and other cyber crimes compared to small and mid-sized businesses.

Nyetya ransomware: what you need to know

Nyetya ransomware: what you need to know

Nyetya Ransomware, a variant of the Petya ransomware, is spreading across businesses all over the world. Here is what you need to know.

Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling the Nyetya Ransomware a more virulent strain of malware that could cause greater damage to both small and large organizations.

Fixing computers drains your firm’s funds

Fixing computers drains your firm’s funds

Aside from overseeing your business’s network security, IT security staff are also adept at fixing personal computers. However, that doesn’t necessarily mean they should. In fact, such occurrences ought to be minimized, if not avoided altogether.

How did WannaCry spread so far?

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.

Warning: Do not install “Google Defender”

Warning: Do not install “Google Defender”

With as much as we write about sophisticated malware and security breaches, sometimes the most effective attacks are the ones that prey on human error. In the most recent case, all it took was an email with a perfect imitation of one of Google’s security screens.