IT News, Blog & Top Tips from SpecTronics

PDF Files: Handy for Businesses — and Hackers

19-Apr-2018 22:14:57 / by Chris Selby-Rickards posted in cybersecurity, data breach, helpdesk, IT, ransomware, anti virus, Backup, business, cyber, cyberattack, cybercrime, fraud, security, hacking, hackers, pdf

0 Comments

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.

Read More

SamSam Is on the Loose and Headed for a Server Near You

19-Apr-2018 14:32:52 / by Chris Selby-Rickards posted in cybersecurity, Disaster Recovery, firewall, breach, data backup, helpdesk, IT, IT Support, phishing, ransomware, anti virus, business, cloud, cyber, cyber threats, cyberattack, cybercrime, IT Services, passwords, security, Server, small business, hacking, software, samsam

0 Comments

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Read More

How to Protect Your Business from Credential Stuffing Attacks

19-Apr-2018 14:21:00 / by Chris Selby-Rickards posted in cybersecurity, data breach, Disaster Recovery, fileless attacks, firewall, solutions, breach, breaches, Business operations, Data, data backup, helpdesk, IT Support, phishing, policy, ransomware, service, support, theft, anti virus, Backup, business, cloud, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, IT Services, london, MSP, passwords, protection, security, small business, technology

0 Comments

Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks work and what you can do to protect your company from them.

Read More

The Devastating Effects of Cyberattacks on Small Businesses

01-Feb-2018 12:14:28 / by Chris Selby-Rickards posted in News, anti virus, business, cyber, cyber attacks, cyber threats, protection, security, small business

0 Comments

Can a cyberattack put your small business out of business? Possibly. Will it cost your company dearly? Most definitely.

Read More

Would You Pay to Get Your Business’s Data Back?

16-Jan-2018 12:42:42 / by Chris Selby-Rickards posted in cybersecurity, firewall, solutions, Business operations, cyber crime, News, phishing, ransomware, theft, anti virus, business, cyber, cyberattack, fraud, gdpr, protection, security, small business

0 Comments

If you came to work one morning and found that your company was the victim of a ransomware attack, would you pay the ransom? Find out why security experts recommend not giving into hackers’ demands and why many organizations do not heed this advice.

Read More

4 Security and Privacy Dangers Businesses Might Encounter in 2018

09-Jan-2018 19:09:04 / by Chris Selby-Rickards posted in cloud computing, cybersecurity, firewall, Business operations, Data, IT, News, phishing, ransomware, theft, anti virus, business, cloud, computers, cyber, cyber threat, cyberattack, cybercrime, email, gdpr, passwords, protection, security, small business

0 Comments

Data breaches and ransomware are not the only dangers your business might face in 2018. Here are four predictions you should be aware of when developing your security and data privacy strategies.

Read More

5 Ways a Managed Services Provider Can Make Your Life Easier

22-Oct-2017 11:58:21 / by Ben Spector posted in cloud computing, cybersecurity, network, solutions, helpdesk, IT, News, service, support, anti virus, business, cloud, computers, cyber, cyberattack, cybercrime, managed, protection, security, small business, wireless

0 Comments

Managed services providers (MSPs) are lifesavers for business owners and executives to manage their IT equipment and services. Among many other things, MSPs update software, provide data backup solutions, and keep files safe from hackers.

Read More

5 Myths about Ransomware Debunked

21-Aug-2017 15:12:18 / by Ben Spector posted in cybersecurity, IT, News, ransomware, cyber, cyberattack, cybercrime, security

0 Comments

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. WannaCry has one redeeming value, though. It is serving as a wake-up call to business leaders who have not been taking this type of threat seriously. Their lack of concern is often due to common misconceptions about ransomware.Here are five myths debunked:

Read More

How Ready Are You For GDPR?

15-Aug-2017 16:13:33 / by Ben Spector posted in cyber crime, IT, News, policy, cyber, cyber threat, gdpr, passwords, protocols, security, training

0 Comments

Does your company have a Cyber Security Policy?

A Company Cyber Security Policy sets out to preserve the security of your data and technology infrastructure. All businesses should have a security policy in place that is regularly assessed, updated as necessary and shared across the entire business, ensuring that all staff comply with that policy.

Read More

What Is Downtime Really Costing Your Business?

11-Jul-2017 11:53:00 / by Chris Selby-Rickards posted in wi-fi, Wireless Communications, cloud computing, cybersecurity, data breach, Disaster Recovery, Email Solutions, network, servers, telecommunications, breach, breaches, Business operations, Data, data backup, desktop, helpdesk, IT, IT Support, Backup, business, cloud, cloud telephony, Communications, computer, computers, cyber, cyberattack, cybercrime, IT Services, london, productivity, remote working, small business, technology, wireless, budgeting, costs

0 Comments

Knowing the costs associated with downtime can help you prioritize IT spending within your technology budget. Learn how to calculate both the direct and indirect costs resulting from downtime.

Read More

Subscribe to Email Updates

Lists by Topic

see all

Posts by Topic

see all

Recent Posts