77 percent of successful cyberattacks against enterprises used fileless techniques. They aren’t as visible as traditional malware, employ a variety of techniques to stay persistent, and can adversely affect the integrity of the organization’s business process and the infrastructures that run them.
February 10, 2019
Benefits of buying IT hardware from an MSP
No one has more incentive to provide you with reliable and long-lasting computer hardware than a managed services provider (MSP). Think about it, a salesperson cares more about the commission, a manufacturer is mostly interested in getting you to buy the next model, and a computer repair shop makes the most money when your computer breaks down.
February 8, 2019
Why are Cyberattacks So Successful?
Good security awareness training is essential, but it MUST be part of a robust security infrastructure and that infrastructure MUST be regularly evaluated and improved.
February 2, 2019
Yet Another Data Breach
Over 1,160,253,228 combinations of email addresses and passwords have been published online in one of the largest data breaches ever. Check to see if your credentials have been compromised.
January 25, 2019
The Government is away, and the Cybercrooks Play
The Government is shutdown and many important agencies are either running on skeleton staffing or have their doors closed and their employees furloughed.
January 19, 2019
Loose Lipped Routers
Its worth taking a minute to check your router to see if it has a little too much to say to folks who shouldn’t be listening.
January 12, 2019
Keyboard Shortcuts for Popular Programs
In the windows operating system, a keyboard shortcut is a set of one or more keys that invoke a command in software or an operating system.
January 8, 2019
Anti-Virus Email Scanners, A HOAX
Did I read that headline correctly? A Hoax? Dude, you MUST be joking or smoking something, how do you figure they’re a hoax.
January 3, 2019