Fileless malware: who are the targets?

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth [...]

2023-05-09T09:34:12+00:00March 3rd, 2017|Security|

5 great ways to prevent cyber-attacks

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of [...]

2023-05-09T09:36:05+00:00February 15th, 2017|Security|

Statistics for cyber security during 2016

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s [...]

2023-05-09T09:36:08+00:00January 12th, 2017|Security|

New year, new cyber-threats

The New Year is upon us, and with it comes a new batch of cyber threats. As advances are made in the world of technology, businesses anticipate changes that can make life more convenient. But, [...]

2023-05-09T09:36:11+00:00December 13th, 2016|Security|

Youth: the real tech-scam victims

As long as there have been salesmen, there have been scammers trying to sell useless products. Traditionally the elderly have fallen prey to cold-call fraud, but now scam artists are getting tech-smart, and it's the [...]

2023-05-09T09:36:13+00:00November 10th, 2016|Security|

Is two-step authentication the only way?

When it comes to protecting yourself and your business online, the type of authentication you use for logins, whether for business or for personal use, is vitally important. While many people understand that secure logins [...]

2023-05-09T09:36:14+00:00October 25th, 2016|Security|
Go to Top