tech blog header

5 Tips to Protect Your Data from Cyber Crime

Posted on Mon, Apr 21, 2014

Is your data safe from cyber thieves?

Cybercrimes are on the rise and the cyber black market has evolved from ad hoc, discrete individuals into a highly organized network of cyber hackers, operating in a multi-billion-dollar economy, per RAND’s recent report. With innovation and growth, the cybercrime market can be very profitable. Here are some basic essentials to include in your cyber security plan. 

Read More

Tags: IT Consulting, Cyber Security, Disaster Recovery, Malware, Managed IT Services Boston, Cybercrime, data security, cloud security, Cyber crimes, disaster preparedness

New Trend: The Point-of-Sale System Hack

Posted on Tue, Apr 16, 2013

With electronic payments now outnumbering cash transactions, the Point-of-sale (PoS) system hack is becoming a more common in the world of cyber crime. In recent years, there have been several high profile cases including the notorious $10 million Subway PoS breach, where at least 150 franchises were targeted, as well as the breach of Barnes & Noble, where credit card readers in 63 stores were compromised. Almost all modern businesses now make use of an electronic PoS systems, and with the hacking of these devices on the increase, it is more important than ever to take appropriate steps to secure your customers’ data.

Read More

Tags: Security, Cyber Security, Malware

Warning Signs your Network Needs Monitoring

Posted on Thu, Nov 15, 2012

A company’s network is one of its most valuable components, not only because of its necessity to the health of operations, but because of its vitality to sustaining business-client relationships through business continuity. One of the most common errors business owners make in terms of IT strategy is to take a reactive approach rather than a proactive approach when it comes to network monitoring. A reactive approach can promote costly downtime, expensive urgent break-fix technical consulting, and often more serious problems such as virus and malware attacks, hacking, and data loss. A good network monitoring system is beneficial to any business, however if your network displays any of the following warning signs, you should consider implementing a monitoring system right away:

Read More

Tags: Email Encryption, Network Monitoring, Malware, hacking

Lessons from 'Internet Doomsday' on Why IT Security Matters

Posted on Thu, Aug 23, 2012

On July 9th, 2012, the Internet was supposed to hit doomsday. Millions of machines worldwide were expected to no longer have access to the Internet resulting in huge losses to businesses and swamped ISP helpdesks. 

Read More

Tags: Security, IT Security, Malware

Watch Out for These Latest Internet Threats

Posted on Wed, Aug 15, 2012

The threat of malware is one that is increasing year after year, and has been doing so steadily. Scams of one sort or another are increasingly being seen on social networking sites and mobile application markets. As ever, you can reduce the risks to yourself by deploying anti-virus programs and keeping them up to date. Their ability to detect suspicious activity has been getting better and better as heuristics improve.

Read More

Tags: Security, Anti-Virus, Malware

Apple iOS Mobile Malware Makes It Into App Store

Posted on Thu, Jul 26, 2012

IT security specialists working with small and medium-sized businesses are well aware of the potential pitfalls of a BYOD approach to provisioning employees with mobile handsets and tablets. The need for such awareness was underlined this month by news that the Apple App Store's efforts to keep out malware did not managed to stop an app known as ‘Find and Call’ from being listed. The same app also made its way into the Google Play marketplace, with the result that Android as well as iOS devices became vulnerable to the Trojan.

Read More

Tags: IT Security, BYOD, Malware

Results of Malware Monday and Why Collaboration was Key

Posted on Mon, Jul 23, 2012

Read More

Tags: Security, Cyber Security, Malware

3 Key Tactics to Fend Against Unknown IT Security Threats

Posted on Wed, Jul 11, 2012

Providing a robust level of IT security involves surmounting two distinct challenges. Not only must IT support personnel deal with the current threats that exist in the known information security environment, they must also attempt to fend off other threats that are as of yet unknown. Sometimes these threats represent a new form of an old trick, a new virus, for example.

Read More

Tags: Security, Network Security, Malware

Anonymous Breach Reporting Can Improve IT Security Efforts

Posted on Wed, Jun 27, 2012

One frequent obstacle to improving IT security can be the fact that businesses, both small and large, that find themselves the target of an attack sometimes have incentives to avoid going public with information.  While this is understandable from a Public Relations standpoint, it also means that other companies that could benefit from such information have no access to it.  Only when breaches involve certain kinds of personal data, types that are protected by state or federal laws, are businesses generally required to admit to a breach.  In many of these cases, however, they still need not go public, as long as they notify the individuals whose personal information may have been compromised.

Now, a new software effort at Georgia Tech Research Institute may change this ‘breach reporting’ landscape.  The institute has developed a system that will allow both government officials and business representatives to share information about their experiences in the current threat environment.  The program, regarded as a ‘malware intelligence system’, is officially titled ‘Titan’ and is currently in beta testing. Titan differs from many similar efforts in one key respect: it will allow those who contribute information to do so anonymously. 

Titan's project leader, Chris Smoak, spoke about the importance of offering businesses IT solutions that enable them to contribute information anonymously: "People tend to think that if an organization gets hit, it was because they had poor security measures. That's not necessarily true, because a variety of factors contribute to intrusions.  Until we get to the point that there's no longer a stigma attached to having an infiltration, people are going to want anonymity to participate."

In addition to spearheading Titan, Smoak heads up the Cyber Technology and Information Security Lab at the institute. The Titan system is much more than a database of reported breaches. It also includes a repository of malware samples, with the system examining and classifying new code on a daily basis, sometimes as many as 100,000 pieces of suspicious code. Smoak sees Titan in the future functioning as a central hub that businesses and other interested parties can consult as needed.

Such central repositories are likely to become increasingly important as cloud computing continues to grow in scope and emphasis. A cloud computing paradigm, of course, involves confronting the threat environment online from moment to moment rather than only when workers happen to launch a browser. In such a computing environment, businesses are best served by using IT outsourcing so that highly qualified managed security providers can protect their information assets.

Whitepaper: 6 Do’s & Dont’s for Choosing the Right IT Service Provider


Read More

Tags: Security, Cyber Security, Malware

What's Scareware? IT Support Pros Give You the Answer

Posted on Wed, Jun 20, 2012

Most individuals even tangentially connected to computer usage in the workplace have heard the term malware to refer to malicious programs such as Trojan horses and viruses.  Far fewer, however, may be familiar with the phenomenon of ‘scareware’.  From an IT support standpoint, however, scareware can be every bit as hazardous to systems at small and medium-sized business as its better-known cousins.

Read More

Tags: Network Security, Cyber Security, Anti-Virus, Malware

Why do I need a Technology Assessment? Find out with this free datasheet.

it support

Follow Us