Insights focusing on: Security

Hacker phishing – How is it used as an attack?
When hackers are the most successful with their phishing expeditions, what is involved in their attack? Hackers use phishing to steal your company’s data in many ways. From the simplest way in, like the click of a link, to extremely complicated ransomware incident strategies. ...

Cybersecurity and the dangers of isolation
One of our reliable IT sources has brought to our attention a very important issue considered to be a danger of cybersecurity: Isolation. How does this particular aspect, which affects every human on earth at some point or another, impact cybersecurity? ...

LockBit ransomware – What is it and are you safe?
Do you know what LockBit ransomware is? How confident are you regarding the security and safety within your internal operations? Is your current IT set up capable of preventing this type of ransomware attack? ...

Fake ransomware – watch out!
Ransomware continues to attack, globally. When compared to the first six months of 2020, this year’s attacks have increased by a shocking 151%! ...

Business closures: There are cybersecurity risks involved
The closing of a business is a major process which includes paying attention to all the loose ends. Perhaps in the haste of closing one’s business, certain security aspects are forgotten, procrastinated, or unknown. ...

Are hosted desktops the answer to a remote workforce?
As we move further into the pandemic abyss, many companies are wondering when it will be time to move back to the office and away from remote working. ...

BEC attacks! What are they?
The FBI has reported that “Business Email Compromise (BEC) schemes have grown 2,370% since 2015. With more than 40,000 domestic and international incidents, these types of scams have cost more than a staggering $5.3 billion in actual and attempted losses.” ...

Five things you should know about Cyber-Insurance
With hacks on software giants like SolarWinds and Kaseya, businesses have learned that everyone is at risk of falling victim to cyber criminals. Breaches disrupt business, damage your ...