In March 2018, the SamSam ransomware ravaged Atlanta’s computer systems, bringing many city services to a halt. This wasn’t the first time hackers used this ransomware to wreak havoc and it won’t be the last. Learn how SamSam differs from most other ransomware.
Around 5 billion stolen credentials are available on the dark web, and cybercriminals like to use them in credential stuffing attacks. Learn how credential stuffing attacks work and what you can do to protect your company from them.
IT policies are important to have because they can help ensure that your company’s IT resources are being used appropriately and productively. Here are eight IT policies often found in companies.
Fileless attacks are on the rise. However, many people are unfamiliar with them. Learn what they are and how to protect your business from them.
To get Android users to download the Skygofree spyware, cybercriminals have been spoofing wireless service providers’ websites. Discover what you can do to prevent your business’s Android devices from becoming infected.
Innovative offerings are making artificial intelligence (AI) accessible for even the smallest of businesses. Here are three types of AI-based solutions that small companies can use to help grow their businesses.
Using older tech devices saves money, but there is a point at which it can hurt business operations. Here are four signs that it might be time to update or replace some tech devices.
Most of the computing devices in use today have two security vulnerabilities in their chips. Learn how this situation evolved, why you should be concerned, and what you can do to protect your business’s devices.
You may have seen news reportsrecently about websites switching over to HTTPS. But what does it mean?