Categories
Blog

5 Online security tips

Security_Oct27_CAny business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online threats. This can be tough, especially for businesses who operate almost exclusively online. To help, here are five tips that can help keep your online activities safe from attacks.

Categories
Blog

CryptoWall – the next security threat

Security_Nov10_CLast year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version – called CryptoWall – that has begun to infect users.

Categories
Blog

Regin – is it really a big threat?

Security_Dec01_CMalware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled. Here is an overview of Regin and what it means exactly for businesses.

Categories
Blog

What to learn from Sony’s security breach

Security_Jan12_CThe scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations. These three tips will take you back to security basics and help avert your own big-screen drama.

Categories
Blog

New spear phishing attack identified

security_dec24_CWhen looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered. This threat, while directed at larger organizations, could be turned against smaller businesses as well, and is therefore worth you knowing about.

Categories
Blog

How to protect yourself against Poweliks

Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware – however much disruption and damage they cause to our systems – can be detected and removed thanks to the tracks they leave as they create havoc, that’s no longer something to count on. Proving the point is Poweliks, an invisible trojan horse that evades being picked up by anti-virus software. Read on to find out all you need to know about Poweliks and how to fight it.

Categories
Blog

How to protect your email account

If you think your email is fully protected from hackers, think again. A lack of sufficient email security measures can result in data theft, unauthorized access to sensitive information and the invasion of your computer by viruses and malware. Here are some tips to secure your email account from unwanted intruders and the many troubles that come with them.

Categories
Blog

Venmo adds multi-factor authentication

It’s easy to get complacent about internet security, but the reality is that none of us can afford to let our guard down. Precautions to protect yourself, your identity and your finances online can be simple, but they are only effective when practiced rigorously and consistently. And while the most obvious things like making passwords hard to guess and locking your workstation are as effective as they ever were, nowhere are conscientious security efforts more crucial than when using online banking systems and mobile payment portals. Users of peer-to-peer payment provider Venmo can breathe a sigh of relief, then, because the service just added extra security controls for its customers.

Categories
Blog

Improved internet security with 3 easy tips

Are you concerned about internet security? Did you know there are a few simple ways to get increased protection that require only minimal investment of time? We’re not just talking about changing your passwords regularly or installing antivirus software. There are a few other methods that are less often talked about – here are three tips to boost your internet security that you might not have thought of yet.

Categories
Blog

How to transition to the cloud securely

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, and makes you believe that anything is possible. Security would never be an issue, right? Ask one of the nearly seven million Dropbox users who had their accounts hacked, and they’ll give you the definitive answer. While it’s worth noting that not every cloud provider has had security breaches like Dropbox, the point is to be aware that cloud security is not something to be taken lightly. Here’s what you can do to protect yourself as a business owner.