Security

19 Oct 2017

Key Reinstallation Attack (“KRACK”) — Wi-Fi/WPA2 Vulnerability

By Mark J. Pappert|October 19th, 2017|

A serious weakness in Wi-Fi's WPA2 security protocol makes it possible for attackers to eavesdrop on your data when you connect to a wireless network. The vulnerability, discovered by Mathy Vanhoef, a computer security researcher, allows an attacker within range of a victim to exploit this weakness using key reinstallation attacks ("KRACKs") to read information [...]

9 Sep 2017

Equifax Gets Breached — Almost 150 Million People Could Be Affected

By Mark J. Pappert|September 9th, 2017|

You're probably familiar with Equifax. As one of the three major US credit bureaus, the company exerts an outsized influence on millions of lives, because their record of your credit score plays a big role in determining if or whether you can get loans, and what your terms will be. Unfortunately, Equifax was hacked, and [...]

31 Aug 2017

“Locky”-Type Ransomware is Attacking Systems

By Mark J. Pappert|August 31st, 2017|

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users' files and appears poised to cause another massive cyber emergency. Here is everything we know so far... QUICK FACTS According to a threat intelligence report, the email-based ransomware attacks [...]

25 May 2017

WannaCry — A Historic Cyberattack

By Mark J. Pappert|May 25th, 2017|

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. RANSOMWARE REVIEW [...]

22 May 2017

Web Browser Cyber-Security — Ranked

By Mark J. Pappert|May 22nd, 2017|

Managing business-level cyber-security is no simple task. Tens of thousands of users are finding that out the hard way as they confront the issue head on in the wake of an international ransomware epidemic (WannaCry). Although many cyber-security strategies require professional IT support, a great place to start is assessing the security of your web [...]

17 May 2017

Password Security — Have You Been ‘Pwned’?

By Mark J. Pappert|May 17th, 2017|

With any data breach — like the recent Bell Canada breach where hackers released over 1.9 million customer email addresses and 1,700 names with phone numbers this past Monday — it's always prudent to review your password security and check to see if any of your accounts have been compromised. Fortunately, one website has made [...]

12 May 2017

Office 365 Receives Security Upgrades

By Mark J. Pappert|May 12th, 2017|

With the increasing sophistication of cyber-attacks, businesses need even stronger security tools to defend their sensitive documents. Fortunately, Office 365 subscribers will now have more advanced security tools to stay ahead of the ever-evolving threat landscape. If you are concerned about security and compliance, these new Office 365 features could help. THREAT INTELLIGENCE Threat Intelligence [...]

10 May 2017

WARNING — Do Not Install ‘Google Defender’

By Mark J. Pappert|May 10th, 2017|

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it's a dangerous trend that is becoming increasingly prevalent. Read on to educate yourself on how to avoid the most recent scam [...]

24 Apr 2017

Homographs — The Newest Trend in Phishing

By Mark J. Pappert|April 24th, 2017|

So much of cyber-security depends on adequate awareness from users. Phishing for example, preys on people's fears and desires to convince them to click on hyperlink images and text before checking where they actually lead to. However, with the latest trend in phishing, even the most cautious users can get swept up. Read on to [...]

19 Apr 2017

Cloud Security — Everything You Need to Know

By Mark J. Pappert|April 19th, 2017|

If small and mid-sized businesses think cyber-security is impossible to manage now, just think about what it was like before the Internet provided a way to receive IT support remotely. In today's business landscape, enterprise-level solutions and security can be delivered from almost anywhere in the world. Read on to find out why the 'cloud' [...]

Go to Top