Tag Archives: cyber security

6 Cyber Security Myths Dissected and Busted

cyber security myths

There are countless myths surrounding the cyber security conundrum, and the ability to separate fact from fiction could play a vital role in protecting your organization.

Topics: , , ,

Your Biggest Security Threats are Convenience and Ignorance

security threats: convenience and ignorance

One can speculate as to why human error is a key piece of so many security breaches, but the fact is that these errors are likely the result of one (or both) of two things: a need for convenience, or simple ignorance.

Topics: , ,

5 Must-Have Mobile Security Features For MSPs

mobile security features for MSPs

Sure. You’ve got your little PIN code to prevent unauthorized access to your phone, but the increase in sophisticated mobile security threats makes the thought of hording confidential data in this environment an unsettling one.

Topics: , , ,

Home Sweet Automated Home: A Look at Home Automation Tech

Internet of things

Home automation devices are really neat, though they do have some security risks and other considerations. Let’s take a look at tech changing our homes for the better.

Topics: , ,

There are Some Big Security Problems with How You Communicate Everyday

email and text security

As people know in the IT industry, good information security is a combination of good security protocol and judicious practices. The trouble is that so many people are ignorant of basic cyber-security concepts.

Topics: , , , ,

Evernote, Feedly, and 5 Lessons From Recent DDoS Attacks

evernote and DDoS

By recruiting an army of enslaved “zombie” computers, a distributed denial of service attack can easily bring a website, app, server, or entire network to its knees with a flood of traffic requests. Its effectiveness is alarming and judging from all the recent activity, occurrences are on the rise.

Topics: , ,

How Can You Take Your Privacy Back?

protecting your privacy

Edward Snowden definitely set off a wave of discussion about privacy. and many people are not waiting for legislators to figure out. Instead, they’re taking matters into their own hands.

Topics: , ,

The Rise of Ransomware

the rise of ransomware

It’s popping up on desktops, laptops, and now even on Android and iOS-based phones. Anyway you look at it, ransomware is on the rise.

Topics: , , ,

Bring Your Own Network: The Next BYOD?

Wifi_logo

Bring your own network and BYOD go hand-in-hand. Let’s explore what this means for businesses still struggling to hop on the BYOD bandwagon.

Topics: , , ,

Public Utilities Have a Serious Windows XP Problem

public utilities and Win XP

Public utilities still have a serious Windows XP problem that isn’t being addressed.

Topics: , , ,

Reduce the Risk of CryptoLocker Without Using Antivirus

cryptolocker

While there are, of course, cases in which CryptoLocker can’t be removed, there are certain best practices for defending against it and there are ways to remove some types of ransomware before it really affects the system it’s on.

Topics: , ,

One Guy’s Opinion: How MSPs Can Keep Medical Practices Secure

Defibrillator Monitor

Medical equipment is designed to help people, but according to a recent article in Wired, many pieces of equipment commonly used by medical practices are extremely easy for hackers to access. We asked our MSP partner Guy Baroan what he does to keep this type of equipment secure.

Topics: , , , ,

Securing Non-Traditional Computing Environments– Or… Not

security and non-traditional computing environments

Many non-traditional computing environments (ATMs, even nuclear missile systems) rely on older technology. What are the associated security concerns?

Topics: , , ,

Is Antivirus Dead?

anti-virus death

Is good old-fashioned antivirus software going the way of CD-ROMs and Windows XP? Recent news reports suggest this. An executive at one major security vendor called antivirus “dead,” adding his company no longer sees it “as a moneymaker in any way.”…

Topics: , , ,

Do You Have Misconceptions About Malware?

misconceptions about malware

Malware is common, and is becoming more common. Even still, there are plenty of popular misconceptions about the threat of malware.

Topics: , , ,

What is Heartbleed and How Does it Affect Me?

StorageCraft corporate logo

Heartbleed is a security bug in the OpenSSL cryptography library. This bug allows a webserver to reply to a malformed heartbeat request with up to 64 kilobytes of data stored in memory on the webserver. What does this mean for users of StorageCraft products?

Topics: , , ,

Metadata and the Great Privacy Debate

how revealing is metadata

Metadata can be created in a wide variety of ways, across a broad range of mediums, but what you really might need to be concerned about is what it says about you.

Topics: , ,

You Want Cloud Security? Here Are Nine Ways StorageCraft Cloud Services Has You Covered

secure cloud computing

When you use StorageCraft Cloud Services for offsite backup, you can rest assured that we’ll be using the highest-caliber security measures available. Let’s take a look at nine things we do to keep things safe and secure.

Topics: , , ,

Are Tech-Savvier Employees Less Secure?

tech-savvy employees and passwords

Ever get so comfortable doing something that you end up cutting corners? That’s what Mike Kane says is happening to your tech-savvier employees when they are accessing cloud applications.

Topics: , , , ,

Half of IT Security Issues are Caused by Human Error– How Do We Fix This?

employees and cyber security

One of the biggest threats to IT security isn’t hackers, it’s employees. What can a company do to make employees more aware of IT security at work?

Topics: , , ,

2013 Data Breaches You Didn’t Hear About

data breach and cyber-security

You have probably heard of the big data breaches of 2013 – Adobe, LinkedIn, Facebook, Target and Snapchat– but lets take a look at the ones you might not know about.

Topics: , , , ,

CPU Sounds Allow Cyber-Security Crack Potential

acoustic cyber-hacking

The actual sounds made by a computer CPU allowed researchers to break one of the world’s most secure encryption algorithms — 4096-bit RSA.

Topics: , , ,

BYOD: How MSPs Can Make It All Come Together

how MSPs build an effective network with BYOD

Bring your own device (BYOD) is quickly becoming a staple for businesses, but how does an MSP support an environment that contains three or more mobile operating systems?

Topics: , , , ,

Cyber-Security: Five Ways Clients Jeopardize It and Five Ways MSPs Can Educate Them

MSPs and cyber security

  As a managed service provider, one of your main responsibilities is protecting clients from security threats. Cyber-security breaches are a way of…

Topics: , , ,

Worried About Cryptolocker? Put Your Fears Aside with ShadowProtect Backups

protecting yourself from Cryptolocker

For a business that’s protected with proper backups, issues like Cryptolocker don’t always cause a big problem. Even if the malicious software makes it onto a workstation, it’s easy to restore to a point-in-time image of when the computer was clean.

Topics: , , , ,