Blog

Mobile malware on Android apps

Smartphones are basically palm-sized computers. As such, they deserve the same protection as desktops and laptops. While there is no need to install bulky security software to protect against cyber threats, there are steps users can take to prevent cybercriminals from penetrating these small computers. Mobile malware MO Malware and other threats pose risks that […]

Utilize Snapchat for business growth

Businesses nowadays are focusing their marketing efforts towards social media. Precious time and money are being invested in expanding customer base, establish corporate identity, and drive revenue. That’s why it’s vital for owners to know which platforms work, and which ones don’t. And this is no walk in the park. Over 71 percent of Snapchat […]

SDN & virtualized networks: how they differ

We’ve talked about network virtualization on this blog before, but there was some recent confusion over whether or not that service is different from software-defined networking. It’s not a big difference, but no, they’re not the same. Let’s take a look at what sets them apart. Software-defined networking (SDN) Managing storage, infrastructures, and networks with […]

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, […]

Russian hackers target Mac OS X users

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced malware for Macs and iOS backups. Here’s how the exploit works. According to antivirus provider […]

Real-world audits: disaster recovery plans

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you receive, nothing beats real-world case studies. If that’s what you’re looking for, a state […]

Attacks on WordPress websites

WordPress is currently the most used web platform, with a market share of 40-50% out of all Content Management Solutions (CMS) platforms. It powers various types of websites, from personal sites to those of small- and medium-sized businesses as well as multinational corporations. If you run a website on WordPress, yours may have been one […]

Social media platforms that suit your SMB

Facebook might be the biggest name in social media, but that doesn’t mean it’s the only one. Since there isn’t a one-size-fits-all platform, there are trendier options such as Instagram and Snapchat, with a burgeoning millennial base to choose from. With that in mind, it’s essential for business owners to understand the pros and cons […]

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices. And based on recent reports, popular printer brands are targeted […]