Cryptoworms: The Future of Ransomware

By |2016-10-27T15:52:34-05:00May 13th, 2016|Categories: Uncategorized|

by: Matt Haring   If you haven’t embraced backups yet because you think you are so tech savvy that you wouldn’t open spam email or fall for social engineering tricks, then brace yourself for cryptoworms. Security researchers warned that self-propagating ransomware, the semi-autonomous kind that doesn’t need any help from humans to spread, is coming [...]

How to Avoid Infections

By |2016-10-27T15:52:34-05:00April 11th, 2016|Categories: Uncategorized|

by: Matt Haring Malware is used when describing software that can cause issues ranging from computer crashes to identity theft. While this is a two-part strategy, you are the biggest factor in keeping yourself safe. Keeping Yourself Safer with Smarter Behavior You are the single biggest factor in preventing a malware infection on your PC. [...]

Counter Terrorism and Fraud Prevention

By |2016-10-27T15:52:34-05:00March 17th, 2016|Categories: Uncategorized|

The world of fraud prevention (and information security in general), is characterized by an arms race between the good guys and the bad guys. Security companies and financial institutions develop solutions, procedures and policies to thwart fraud attempts, while fraudsters develop the tools and techniques to circumvent these systems. If a certain fraudulent activity is [...]

New Locky Ransomware – FAQs and How You Can Act Now

By |2016-10-27T15:52:34-05:00February 24th, 2016|Categories: Uncategorized|

by Mary McCoy Have you opened any invoice attachments lately? Now, there's a new ransomware called Locky that's joined the ranks of viruses like CryptoLocker and CryptoWall. This latest malware threat was detected just last week and already IT service providers and MSPs have discovered that it's spread at an alarming rate, employing sophisticated social [...]

Secrets to Staying Safe Online

By |2016-10-27T15:52:34-05:00February 23rd, 2016|Categories: Uncategorized|

  Why should I care about online security? It’s tempting to assume that only big businesses or big celebrities have to worry about their online security. After all, personal information isn’t as interesting to anonymous hackers as if it was personal information of big timers, is it? But the truth is, we all have information [...]

How to Easily Avoid PC Infections

By |2016-10-27T15:52:34-05:00January 20th, 2016|Categories: Uncategorized|

  The single biggest factor in preventing a malware infection on your PC is YOU. You don’t need expert knowledge or special training. You just need vigilance to avoid downloading and installing anything you do not understand or trust, no matter how tempting might be!  Below are some tips on how to easily avoid a computer [...]

Mobile Data Protection

By |2016-10-27T15:52:34-05:00December 8th, 2015|Categories: Uncategorized|

Mobile Data Protection Today we are writing about how malicious hackers are stealing private mobile device data by accessing local backup files stored on both PC and Mac computers. Network Security Analysts have identified 704 samples of six Trojan, adware, and HackTool families for Windows® or Mac® OS X® systems that used this technique to steal [...]

Unpredictable Entropy

By |2016-10-27T15:52:34-05:00October 19th, 2015|Categories: Uncategorized|

Passwords are something that every user hates; having to enter passwords several times in a day in order to access a system. In Information Security there is a concept called CIA. This is not the Central Intelligence Agency, but rather represents the three tenants of Information Security: Confidentiality, Integrity, and Availability. Passwords tie into this [...]

It’s not about the where, but rather the how…

By |2016-09-01T16:34:05-05:00September 21st, 2015|Categories: Uncategorized|

    I want to start off this post with a quote from the late Steve Jobs circa 1997, "I don't need a hard disk in my computer if I can get to the server faster… carrying around these non-connected computers is byzantine by comparison." He envisioned a day when one wouldn't need to have disks and [...]