What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office,

By |2022-01-06T08:42:21+00:00August 23rd, 2018|Security|

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more. Spectre 101 For those who don’t know, Spectre is a vulnerability in

By |2019-11-13T15:42:14+00:00August 7th, 2018|Security|

New Spectre-style attack discovered

Cyberattacks continue to evolve at a worrying pace. Just when you think one security threat has been fixed, a more dangerous version of that threat is discovered. One such threat is Spectre and it’s more recent variant, NetSpectre. Read on to learn more. Spectre 101 For those who don’t know, Spectre is a vulnerability in

By |2019-11-13T15:42:24+00:00August 7th, 2018|Security|

IT security policies your company needs

Businesses rarely address cybersecurity in their company policies. With cybercrimes becoming more prevalent, it's important you inform staff about the threats they could be exposed to. Make sure your business and employees are safe with these security policies. Internet In today’s business world, employees spend a lot of time on the internet. To ensure they’re

By |2019-11-13T15:44:21+00:00July 23rd, 2018|Security|

Assess risks before buying new software

The growing market for cybersecurity products is a sign that businesses are taking the issue seriously. But before your company jumps into investing in any product, ask yourself if it’s really necessary. Find out how you can make the most out of cybersecurity products by conducting a risk assessment. Uncover threats and vulnerabilities Every business

By |2019-11-13T15:45:15+00:00July 5th, 2018|Security|

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought. Small businesses are especially at risk and need to take action. VPNFilter recap A

By |2019-11-13T15:48:49+00:00June 20th, 2018|Security|

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here. For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol

By |2019-11-13T15:49:55+00:00June 14th, 2018|Google, Security, Web & Cloud|

Office 365 will block Flash by 2019

Microsoft recently announced plans to eventually stop the activation of Silverlight, Shockwave, and Flash content in Office 365. This is not just the developers disabling bugs with an option to click a link or button to look at content. Within a few months' time, Flash will be gone from Office 365 for good. What media will

By |2019-11-13T15:50:29+00:00June 6th, 2018|Office, Security|

Mitigating healthcare insider threats

The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats? Read on. #1 Educate - The workforce (meaning all healthcare employees) must be educated on allowable uses and disclosures of protected health

By |2019-11-13T15:50:32+00:00June 5th, 2018|Healthcare, Security|