Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

Posted by Chris Selby-Rickards on 09-Jul-2018 14:54:56

Honeypots Reveal How Hackers Might Attack Your Business’s Cloud-Based Systems

To discover the security risks that businesses might face when they use public clouds, researchers conducted an experiment using honeypots. Here is what the researchers discovered.

Read More

Topics: cloud computing, cloud, cybersecurity, hackers, hacking, small business, business

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Chris Selby-Rickards on 09-Jul-2018 14:08:22

Read More

Topics: computer security, hackers, scams, hacking, theft, servers, small business, security, protection, ransomware, phishing, passwords, fraud, firewall, data breach, cybersecurity, cyberattack, cybercrime, cyber threats, cyber, computers, cloud, business, breaches, anti virus

Business Email Scammers Put Behind Bars

Posted by Chris Selby-Rickards on 09-Jul-2018 12:21:36

Read More

Topics: anti virus, business, Business operations, computers, cyber attacks, cyber, cyber crime, cybersecurity, cybercrime, cyberattack, email, Disaster Recovery, fraud, IT Support, london, office 365, phishing, security, small business, ransomware

What is Phishing?

Posted by Chris Selby-Rickards on 20-Jun-2018 15:22:48

What is Phishing and How to Keep Your Company Safe From Phishing Attacks

Phishing is a type of cyberattack in which criminals essentially trick users into disclosing their personal information such as passwords, credit card numbers and so on. This is becoming an increasingly popular attack vector, with more than 3 in 4 (76 percent) organizations in the UK saying they experienced a phishing attack in 2017, according to figures collated by Wombat Security.

Read More

Topics: security, computer security, phishing, cybersecurity, cybercrime, cyber attacks, email

Cybercrime in Business

Posted by Chris Selby-Rickards on 01-Jun-2018 13:13:38

Cybercrime in Business.

The 5 Most Costly Types of IT-Related Cybercrimes

A report issued by the Internet Crime Complaint Centre shows that cybercrime victims lost more than £1 billion in 2017. Here are the top five IT-related cybercrimes that cost businesses and individuals the most amount of money.

Read More

Topics: security, cyber crime, cybercrime, cybersecurity, cyber attacks

What is Cloud Computing used for?

Posted by Chris Selby-Rickards on 02-May-2018 13:55:41

cloud data backup

What is Cloud Computing used for?

The Top 5 Benefits of Hybrid Cloud Backup

 

Have you switched your company’s backup solution to hybrid cloud backup yet? Find out 5 reasons why you should consider jumping onto the hybrid cloud backup bandwagon.

Read More

Topics: file sharing, data storage, onedrive, filing system, file share, folders, files, 365, computer security, microsoft, office, software, Backup, Business operations, chrome, cloud, cloud computing, Collaboration, computers, cybersecurity, Data, data backup, google, small business, security

Is the Cloud safe?

Posted by Chris Selby-Rickards on 02-May-2018 13:48:25

Is the Cloud safe? How Cloud Service Providers Can Prove Their Data Security Claims

Cloud service providers often promise that they will take good care of their customers’ personal data. Here is how you can make sure they will deliver on that promise.

Read More

Topics: file sharing, data storage, onedrive, computer security, filing system, file share, folders, files, Data, cybersecurity, cloud computing, cloud, small business, security

PDF Files: Handy for Businesses — and Hackers

Posted by Chris Selby-Rickards on 19-Apr-2018 22:14:57

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.

Read More

Topics: hackers, pdf, hacking, security, ransomware, IT, helpdesk, fraud, data breach, cybersecurity, cyberattack, cybercrime, cyber, business, Backup, anti virus

Business Email Scams Are on the Rise

Posted by Chris Selby-Rickards on 19-Apr-2018 14:37:09

Sophisticated email scams designed to con companies out of money and sensitive data are on the rise. Learn how to avoid falling victim to these scams.

Read More

Topics: scams, email, phishing, websites, theft, solutions, small business, service, servers, security, ransomware, protection, anti virus, cybersecurity, Data, data breach, Email Solutions

SamSam Is on the Loose and Headed for a Server Near You

Posted by Chris Selby-Rickards on 19-Apr-2018 14:32:52

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Read More

Topics: ransomware, samsam, cybersecurity, software, hacking, small business, Server, security, phishing, passwords, IT Support, IT Services, IT, helpdesk, firewall, Disaster Recovery, data backup, cybercrime, cyber threats, cyberattack, cyber, cloud, business, breach, anti virus

Something Powerful

Tell The Reader More

The headline and subheader tells us what you're offering, and the form header closes the deal. Over here you can explain why your offer is so great it's worth filling out a form for.

Remember:

  • Bullets are great
  • For spelling out benefits and
  • Turning visitors into leads.

Subscribe Here!

Recent Posts

Posts by Tag

See all