tech blog header

Free Whitepaper

Follow Us

Your email:

Blog Topics

Current Articles | RSS Feed RSS Feed

5 Low Tech Solutions to Deter Cybercrimes

 
Courtesy: Forbes.com

Cybercrimes are on the rise and the cyber black market has evolved from ad hoc, discrete individuals into a highly organized network of hackers, operating in a multi-billion-dollar economy, per RAND’s recent report. With innovation and growth, the cybercrime market can be very profitable.

New Trend: The Point-of-Sale System Hack

 
point of sale hack

With electronic payments now outnumbering cash transactions, the Point-of-sale (PoS) system hack is becoming a more common in the world of cyber crime. In recent years, there have been several high profile cases including the notorious $10 million Subway PoS breach, where at least 150 franchises were targeted, as well as the breach of Barnes & Noble, where credit card readers in 63 stores were compromised. Almost all modern businesses now make use of an electronic PoS systems, and with the hacking of these devices on the increase, it is more important than ever to take appropriate steps to secure your customers’ data.

Warning Signs your Network Needs Monitoring

 
network monitoring

A company’s network is one of its most valuable components, not only because of its necessity to the health of operations, but because of its vitality to sustaining business-client relationships through business continuity. One of the most common errors business owners make in terms of IT strategy is to take a reactive approach rather than a proactive approach when it comes to network monitoring. A reactive approach can promote costly downtime, expensive urgent break-fix technical consulting, and often more serious problems such as virus and malware attacks, hacking, and data loss. A good network monitoring system is beneficial to any business, however if your network displays any of the following warning signs, you should consider implementing a monitoring system right away:

Lessons from 'Internet Doomsday' on Why IT Security Matters

 
IT Security and Trojan Viruses

On July 9th, 2012, the Internet was supposed to hit doomsday. Millions of machines worldwide were expected to no longer have access to the Internet resulting in huge losses to businesses and swamped ISP helpdesks. 

Origins


Watch Out for These Latest Internet Threats

 
Anti-Virus

The threat of malware is one that is increasing year after year, and has been doing so steadily. Scams of one sort or another are increasingly being seen on social networking sites and mobile application markets. As ever, you can reduce the risks to yourself by deploying anti-virus programs and keeping them up to date. Their ability to detect suspicious activity has been getting better and better as heuristics improve.

Apple iOS Mobile Malware Makes It Into App Store

 
Apple iOS IT Security

IT security specialists working with small and medium-sized businesses are well aware of the potential pitfalls of a BYOD approach to provisioning employees with mobile handsets and tablets. The need for such awareness was underlined this month by news that the Apple App Store's efforts to keep out malware did not managed to stop an app known as ‘Find and Call’ from being listed. The same app also made its way into the Google Play marketplace, with the result that Android as well as iOS devices became vulnerable to the Trojan.

Results of Malware Monday and Why Collaboration was Key

 
Malware Monday and IT security

In recent news, an IT security problem dubbed ‘Malware Monday’ was a major concern for small and medium-sized businesses everywhere as the FBI shut down DNSChanger servers. This caused a major problem for those who attempted to access the internet using a computer that was infected with the malware.

3 Key Tactics to Fend Against Unknown IT Security Threats

 
IT Security and Malware

Providing a robust level of IT security involves surmounting two distinct challenges. Not only must IT support personnel deal with the current threats that exist in the known information security environment, they must also attempt to fend off other threats that are as of yet unknown. Sometimes these threats represent a new form of an old trick, a new virus, for example.

Anonymous Breach Reporting Can Improve IT Security Efforts

 
IT Security

One frequent obstacle to improving IT security can be the fact that businesses, both small and large, that find themselves the target of an attack sometimes have incentives to avoid going public with information.  While this is understandable from a Public Relations standpoint, it also means that other companies that could benefit from such information have no access to it.  Only when breaches involve certain kinds of personal data, types that are protected by state or federal laws, are businesses generally required to admit to a breach.  In many of these cases, however, they still need not go public, as long as they notify the individuals whose personal information may have been compromised.

What's Scareware? IT Support Pros Give You the Answer

 
Scareware Example

Most individuals even tangentially connected to computer usage in the workplace have heard the term malware to refer to malicious programs such as Trojan horses and viruses.  Far fewer, however, may be familiar with the phenomenon of ‘scareware’.  From an IT support standpoint, however, scareware can be every bit as hazardous to systems at small and medium-sized business as its better-known cousins.

All Posts