Blog

Is Regin a real threat to your company?

While there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it’s tough to deal with and […]

Net Neutrality – what is it?

Over the past few years there have been a number of issues and rulings made by various courts in the US regarding the overall freedom of the Internet and how it is to be managed. By now, many of us have heard of Net Neutrality, but it may seem like an issue that won’t affect […]

New security threat: CryptoWall

In October of last year news broke about a new form of malware called Cryptolocker. This malware posed a particularly large threat to many business users and led to many quick and important security updates. Now, almost a year later, it appears that the second version of this – CryptoWall – has been released and […]

5 Ways to secure online activity

As businesses continue to implement more and more Internet-based systems, there is always the risk that systems could be breached and security compromised. If you conduct business online, there are a number of measures you can take to ensure that your activities and your company’s vital information are secure. Here are five. 1. Use two-factor […]

New security flaw leads to Shellshock

In late spring of this year news broke of the biggest security issue to date – Heartbleed. Many companies leapt to secure themselves from this, but the fallout from it is still being felt. That being said, there is a new, even bigger, security problem called Shellshock that all businesses need to now be aware […]

5 Ways business security is flawed

Business owners and managers are becoming increasingly worried about the security of their systems and networks. While the vast majority have implemented some form of security, this may not be enough. In fact, we have helped a number of businesses with flawed security measures in place. The issue is, how do you know if your […]

Cloud and data breach prevention

Today’s technology advancement has one obvious parallel: increasing security threats. One such issue which has been growing both in number and intensity is data breach. And while many businesses have turned to the cloud in the hope of improving security, there is still a chance of a collision between data breaches and cloud usage. But […]

What’s juice jacking?

Everyone today seems to be constantly relying on their smartphones to help complete daily tasks which has resulted in the need to recharge subsequently increasing. And when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to juice jacking of your smartphone. If this is news […]

Russian hackers expose 1.2 B accounts

The idea of Internet security is almost always being called into question. It seems like nearly every month there is a security breach where important information like usernames and passwords are stolen. The trend appears to be increasing, with an ever expanding number of accounts being hacked. In early August, news broke of possibly the […]

5 ways systems can be breached

When it comes to business security, many small to medium business owners and managers often struggle to ensure that their systems and computers are secure from the various attacks and malware out there. While there are a million and one things you can do to secure systems, one of the most useful approaches is to […]