Archive

Category Archives for "Security"

Spearfishing and Whaling: How To Protect Against Phishing Scams

Phishing scams typically come from email messages – and it can affect your desktop, laptop, tablet, or smartphone. Phishing scams work by enticing you to click a link in an email message, bringing you to an incredulous website. There, the website will force you or encourage you to divulge private information, like your full name, address, or sensitive financial data. Then the person on the other side of the website will be able to use your private information for their use. Identity theft is a reality of using the Internet. However, by understanding how phishing scams work, you will be able to identify them and prevent them from being a problem.  Continue Reading

Why SMBs Must Proactively Address the Threat of Mobile Hacks

More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully underestimate the security vulnerabilities linked to mobile devices like smartphones and tablets. Continue Reading

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of a small company’s website? What’s to stop someone from sending visitors of your site to an adult site or something equally offensive?  Continue Reading

Stay Secure My Friend… More Hackers Targeting SMBs

Many SMBs don’t realize it, but the path to some grand cybercrime score of a lifetime may go right through their backdoor. SMBs are commonly vendors, suppliers, or service providers who work with much larger enterprises. Unfortunately, they may be unaware that this makes them a prime target for hackers. Worse yet, this may be costing them new business.

Larger companies likely have their security game in check, making it difficult for hackers to crack their data. They have both the financial resources and staffing power to stay on top of security practices. But smaller firms continue to lag when it comes to security. In many cases, the gateway to accessing a large company’s info and data is through the smaller company working with them. Exposed vulnerabilities in security can lead cybercriminals right to the larger corporation they’ve been after.  Continue Reading

Four Key Components of a Robust Security Plan Every SMB Must Know

Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable digital assets and data that should not be breached under any circumstances.

This makes it the responsibility of every business, especially those collecting and storing customer/client information, to implement a multipronged approach to safeguard such information.

Yes, we’re looking at you, Mr. Pizza Shop Owner who has our names, addresses, phone numbers, and credit card information stored to make future ordering easier and hassle free. Continue Reading

Staying safe and minimizing risk while using social media

Do your friends make questionable decisions on social media? Yes, because many of our friends actually help scammers share their message, many because they are not well-informed. But just in case you’re in any doubt about how important it is to proceed with caution on social media, consider these three factors:

  1. The web is a dangerous place: The security company Sucuri scanned about 10 million websites and found 26% of them were compromised (hosting malicious injections or otherwise blacklisted).
  2. People are sharing more personal data than ever: That’s not just a hunch, that was the finding of a seven-year study by researchers at Carnegie Mellon University: Silent Listeners: The Evolution of Privacy and Disclosure on Facebook.
  3. Consumers are not the only victims: Criminals conducting cyber attacks against companies are finding social media a great resource (there are several social media attack scenarios in the recently published Trustwave 2013 Global Security Report).

Continue Reading

Turn off Java for security reasons

Is Java turned on in your web browser? If your answer is “Yes” or “I’m not sure” then it’s time to take action. Right now, cyber-criminals are aware and exploiting serious security flaws in Java that could lead to your computer becoming infected by malware.
The best advice we can give you is to disable Java.

Here are some simple instructions for users of the most popular browsers, explaining how Java can be disabled:

http://www.java.com/en/download/help/disable_browser.xml

So, what are you waiting for?, stop reading this article now and check if you have disabled Java or not. Chances are that if you don’t think that you need Java, you don’t need it.

What you need to do now is reduce the opportunities for attack. For most people that means disabling Java – and doing it now.

If you insist or must have Java. Download the most recent version here:

http://www.oracle.com/technetwork/java/javase/downloads/index.html

1 3 4 5