Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands. The state of ransomware […]

Tips to address Office 365 security issues

Microsoft’s Office 365 is highly popular among businesses not just because of its robust features and cost-saving benefits but also because it’s widely perceived as secure. Unfortunately, using it comes with security challenges, but don’t fret — there are ways to solve them. Vulnerabilities in SharePoint Businesses typically use SharePoint Online and on-premises SharePoint sites […]

How to respond to Mac malware

Slow performance and bugs are telltale signs that your Mac is infected with malware. If left unchecked, malware can give hackers a backdoor into your system, steal data, and cause irreparable damage to your company. The best thing you can do against a malware attack is to address it as quickly as possible. Here’s how. […]

Virtual DR protects against ransomware

Ransomware is a type of malware that encrypts your data and makes it impossible to access unless you pay a ransom. While it may appear to be difficult to stop, you should never give in to the hacker’s demands. Before you end up being a victim of ransomware, protect yourself with virtual disaster recovery (DR) […]

Fileless malware: The guileful threat

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorized protocols to carry out malicious activities such as unauthorized data retrieval or data damage. It therefore pays to stay abreast of such […]

Autocomplete password risks

Advertisements and suggestions based on our internet browsing habits are sources of online tracking. However, autocomplete passwords are also another source of online tracking. This sneaky tactic comes with serious security risks. Here’s how you can stop it from targeting you. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion […]

Protect your VoIP system from phishers

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed […]

Why you need a VPN and how to choose one

Installing antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, third parties, and ISPs constantly monitoring networks and your online habits, hopping onto a virtual private network (VPN) is crucial for keeping your surfing habits private. Here’s why. What is a VPN? The best way to describe […]

There is ransomware for Android devices

The increasing usage of mobile devices, specifically by businesses, will naturally entice more hackers to develop mobile ransomware. What is this form of malware, and how can you keep it from invading your Android device? How does ransomware make it onto your Android device? Like its desktop equivalent, mobile ransomware needs to be installed on […]