Hybrid clouds give flexibility to SMBs

Most people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation allows SMBs to have the best of both cloud worlds while minimizing

By |2019-11-07T05:44:31+00:00July 7th, 2016|Web & Cloud|

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security

By |2019-11-07T05:46:40+00:00July 5th, 2016|Security|

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks sent out the names, addresses, Social Security numbers, compensation information and

By |2019-11-07T05:55:10+00:00June 20th, 2016|Security|

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s

By |2019-11-07T05:58:03+00:00June 9th, 2016|Security|

5 tricks for thwarting VoIP threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and phishing, they’re no less dangerous or damaging to your SMB. Let’s examine 5 five

By |2019-11-07T06:15:23+00:00May 23rd, 2016|VoIP|

Are your site’s images hiding an attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to

By |2019-11-07T06:17:29+00:00May 17th, 2016|Security|

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you

By |2019-11-07T06:26:28+00:00April 28th, 2016|Security|

Improved email security for Office 365

No matter how much technology advances, human error has always been a fact of life. Nowhere is this more pertinent than when it comes to email security as many of today’s breaches start in an employee’s inbox. But now Microsoft is looking to change this. In the coming weeks, the technology giant intends to launch

By |2019-11-07T06:29:58+00:00April 21st, 2016|Office|

The security risks of virtualization

While virtualization security is not often talked about, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to the success of your business. So what are some of the security risks posed by virtualization? And how can you mitigate them? Here are some answers you should consider. Security risks of virtualization

By |2019-11-07T06:39:02+00:00March 31st, 2016|Virtualization|

Tips to monitor employee activities online

When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring. And if

By |2019-11-07T06:51:08+00:00March 15th, 2016|Security|