Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands. The state of ransomware […]

A Trojan Horse

Cybercriminals are continually updating their methods of attack and in response cyber defense strategies continue to evolve. However, one element remains constant on the cyber battlefield, the human element. Most cyberattacks are targeted towards known vulnerabilities in a network’s cyber defense and as these electronic countermeasures become more sophisticated, cybercriminals will try to gain access through alternative methods.

Safeguarding your social media from hackers

Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away. Lock screens exist for a reason Lock all your computing devices as soon as you stop using them. This […]

Tips and tricks to prevent watering hole attacks

Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal with oneway criminals steal data: watering hole attacks. […]

Distributed spam distraction used for illegal activities

Usually, when victims find out their account has been hacked or hijacked, serious damage has already been done. But there’s a new illegal activity that cybercriminals are employing — and it’s done in plain sight. Distributed spam distraction involves sending thousands of spam email, and they do more than cause distractions. Understanding DSD Distributed spam […]

The “Big Tech” Breakup

2018 was a tough year for the American technology industry and 2019 is showing no signs of relief. Data breaches, court hearings and growing foreign competition are putting new pressures on tech giants like Google, Facebook, Apple and Amazon while concerns over the size and influence of these companies continue to grow.

Is Privacy a Thing of the Past?

Electronic devices, they’re everywhere, in your car, kitchen, pocket, even your bedroom, and they’re listening. Not only do these devices have the ability to constantly listen in with their microphones, they’re also collecting massive amounts of information about you that includes everything from your web searches to your sleep cycles.

Guarding your company’s data

Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any […]