Reputation Jacking: Another Trick Up Hackers’ Sleeves

Posted by Ben Spector on 13-Jan-2019 11:41:29

cybercrime-100534917-large

Reputation-jacking is on the rise. Discover what reputation-jacking is and why cyber criminals like to use it when attacking businesses.

Read More

Topics: Cloud Computing, Data Breach, Email Solutions, Business operations, helpdesk, IT Support, business, cyber attacks, cyber threats, data protection, business tips, Cyber Security

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Posted by Ben Spector on 09-Jul-2018 14:39:33

shutterstock_189358703

Faceless Cybercriminals Aren’t the Only People Who Might Steal Your Business Data

Although most companies take measures to defend against external cyberattacks, threats from within are often overlooked. Find out how to defend your business against insider threats.

Read More

Topics: Data Breach, Disaster Recovery, firewall, Data, Data Backup, IT Support, business, computers, protection

The 5 Most Costly Types of IT-Related Cybercrimes

Posted by Ben Spector on 09-Jul-2018 14:08:22

shutterstock_680075008

Read More

Topics: Cloud Computing, Data Breach, firewall, servers, phishing, ransomware, theft, anti virus, business, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, Passwords, protection, Small Business, hacking, scams, hackers, Cyber Security

GDPR Deadline Is Looming

Posted by Ben Spector on 19-Apr-2018 22:18:14

The date on which companies need to be in compliance with the General Data Protection Regulation (GDPR) is approaching fast. Find out when this deadline is and what it means for businesses worldwide.

Read More

Topics: Data Breach, solutions, Data, Data Backup, IT, IT Support, business, GDPR, london, Small Business

PDF Files: Handy for Businesses — and Hackers

Posted by Ben Spector on 19-Apr-2018 22:14:57

PDF files are the No. 1 type of file used in cyberattacks. Find out why hackers like to use them and how to protect your business.

Read More

Topics: Data Breach, Data Backup, helpdesk, IT, ransomware, anti virus, business, cyber, cyberattack, cybercrime, fraud, hacking, hackers, pdf, Cyber Security

Business Email Scams Are on the Rise

Posted by Ben Spector on 19-Apr-2018 14:37:09

Sophisticated email scams designed to con companies out of money and sensitive data are on the rise. Learn how to avoid falling victim to these scams.

Read More

Topics: Data Breach, Email Solutions, servers, solutions, Data, phishing, ransomware, service, theft, anti virus, email, protection, Small Business, websites, scams, Cyber Security

SamSam Is on the Loose and Headed for a Server Near You

Posted by Ben Spector on 19-Apr-2018 14:32:52

In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.

Read More

Topics: Cloud Computing, Data Breach, Disaster Recovery, firewall, Data Backup, helpdesk, IT, IT Support, phishing, ransomware, anti virus, business, cyber, cyber threats, cyberattack, cybercrime, Passwords, Server, Small Business, hacking, software, samsam, Cyber Security

How to Make Your WordPress Website Harder to Hack

Posted by Ben Spector on 19-Apr-2018 14:26:01

Websites built on the WordPress platform are at medium to high risk of being attacked. Find out what you can do to make your business’s WordPress website harder to hack.

Read More

Topics: Data Breach, Business operations, anti virus, business, https, Small Business, websites, hacking, wordpress, plugins, software, website, cms, Cyber Security

How to Protect Your Business from Credential Stuffing Attacks

Posted by Ben Spector on 19-Apr-2018 14:21:00

Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks work and what you can do to protect your company from them.

Read More

Topics: Cloud Computing, Data Breach, Disaster Recovery, firewall, solutions, Business operations, Data, Data Backup, helpdesk, IT Support, phishing, policy, ransomware, service, theft, anti virus, business, computers, cyber, cyber threats, cyberattack, cybercrime, fraud, london, MSP, Passwords, protection, Small Business, technology, File Sharing, Cyber Security

8 Policies to Protect Your Business’s IT Assets

Posted by Ben Spector on 05-Apr-2018 12:38:19

IT policies are important to have because they can help ensure that your company’s IT resources are being used appropriately and productively. Here are eight IT policies often found in companies.

Read More

Topics: Data Breach, Disaster Recovery, firewall, Business operations, Data Backup, IT, IT Support, anti virus, business, Communications, email, Google, london, managed, Office 365, Passwords, Small Business, technology, Cyber Security

Join Our Mailing List

Recent Posts

Posts by Tag

See all