5 Ways to Tell If the Email You Received Is Legitimate or Not

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Most people think that network security revolves around protecting against hacker attacks. Actually, the greatest threat is from your users. One of the most common threats to Email Security is phishing. Phishing is a threat where a thief tries to use email as a means to find out information that can be used to extract […]

Spear Phishing vs Phishing: What's the difference?

Spear Phishing vs Phishing: What’s the difference?

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Cyber Security is continually in the mind of a corporate IT leader.  We read daily of website hacking, information theft, and ID theft.  Businesses have been brought to their knees and sometimes made to fail through hacking attacks and information theft.  Enough to give any business executive grey (or no) hairs. However, concentrating Cyber Security […]

Two Factor Authentication: Is it really a way to protect your security

Two Factor Authentication: Is it really a way to protect your security?

Posted on Leave a commentPosted in Business, Cybersecurity

Online IT Security lies heavily on the minds of all online users today, particularly those executing online financial transactions. IT Security used to rely on a single level of authentication, usually a password or PIN code. As the crooks became more adept at uncovering user credentials through techniques such as phishing and keylogging exploits, it […]

How Software Patches Make or Break Your Cyber Security Plan

How Software Patches Make or Break Your Cyber Security Plan

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

You have set up your core and edge cybersecurity procedures.  You have defined policies and procedures to be followed to limit the possibility of malware attacks.  You have a dedicated team monitoring cybersecurity concerns.  You consider that you have done all you can do to achieve comprehensive coverage.  Is that enough? The cybersecurity environment is […]

Commonly overlooked issues that open security holes in your business

Posted on Leave a commentPosted in Business, Cybersecurity, Insights

Online Security is a pressing concern for all IT Heads.   The increasing incidence of malware, both in itself and in new distribution vectors is a real headache.  Most of the common threats are well documented as are preventative measures and recovery techniques.  There are, however, a few issues that are often overlooked causing gaps in […]

Types of malware distribution strategies you need to prevent

Posted on Leave a commentPosted in Business, Cybersecurity, Insights, Tips

The online security war between hackers and and anti-malware developers has moved on to keep pace with the development of new technologies.  As new malware is detected and blocked, the hackers invent new malware and are expanding into new distribution vectors. Online Security is not only anti-malware applications and devices. It is an attitude of […]