[vc_row][vc_column][vc_column_text]We've talked about ransomware a lot in 2016. It's a growing, ever-evolving threat to your data security that you may not be paying enough attention to. Preventing this form of cybercrime takes a combination of robust security,...
Data Security
SMBs Struggle with Cyber Security During the Holidays
[vc_row][vc_column][vc_column_text]In retail environments, 4th quarter earnings can make or break you. Business owners focus on ensuring they have enough stock to cover the demand, without creating surplus inventory. But, are they taking stock of their cyber security...
3 Tips to Prevent Malware in Your POS System
[vc_row][vc_column][vc_column_text]We talk a lot about malware and protecting your computers and servers from intrusion. But, your Point-of-Sale systems are another window of weakness where cyber attacks can occur. We all remember the Target attack. More recently,...
Digital Ghosts Can Be a Nightmare For Data Security
[vc_row][vc_column][vc_column_text]As Halloween nears, we thought a ghost story would be a good idea. But, this isn't about Casper or ghosts in the traditional sense at all. This is a new kind of haunting, one that can linger long after death if not exorcised...
Be Cyber Safe: October Is National Cyber Security Month
[vc_row][vc_column][vc_column_text]Since 2004, October has been observed as National Cyber Security Awareness Month (NCSAM) and was created in a collaborative manner between the U.S. government and industry in the hopes of increasing awareness regarding cyber security...
US Gov’t Issues Malware Warning Tied to Hurricane Matthew
[vc_row][vc_column][vc_column_text] Weather isn't the only threat to fear in a hurricane. Cyber criminals are using the chaos and destruction following Hurricane Matthew to take advantage of unsuspecting web users using malware and phishing scams. The US Computer...
Google Amps Up Internet Security For Everyone
[vc_row][vc_column][vc_column_text] There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing....
EMV Everywhere: All About the Chip Card Revolution
[vc_row][vc_column][vc_column_text]All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It's an older but highly secure technology that is almost impossible to hack. The move to this type of...
3 Ways Dear Aunt Sally is a Potential Data Security Victim
[vc_row][vc_column][vc_column_text]Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks,...
5 Must-Have Features of Antivirus Software
[vc_row][vc_column][vc_column_text] Since consumers and businesses first started connecting their computers to the internet decades ago, antivirus software has been one of the most important segments of the tech industry. It’s become so ubiquitous in fact, that many...