A firewall is a device that sits on the perimeter of your network, allowing (hopefully) good traffic in and blocking bad traffic. EVERY business and individual concerned with keeping bad guys out needs one.
WELCOME TO OUR BLOG
Thanks to powerful password-cracking software that is readily available online, hackers can guess a five-character password in under three hours. If you only use lowercase letters, it’s 11.9 seconds.
If you plan on catching up on some work from home AND you’re using a personal device such as a smartphone or personal laptop – DON’T! Unless your personal device is covered under your organization’s IT support plan and tools, your device could be the one used to introduce a significant cyber-attack or data breach of your organization’s technology.
You’re working at your computer when all of the sudden – BAM! – you get a pop-up notification that your PC is infected with a virus and you must “click here” to run a scan or install antivirus software.
Not too long ago, the CryptoLocker ransomware virus was all over the news, infecting over 250,000 computers in its first 100 days of release (at least that’s the number reported – the real numbers are probably MUCH higher). The threat was fairly straightforward: Pay us or we’ll delete all your data.
A phishing e-mail is a bogus e-mail that is carefully designed to trick the end user into looking like a legitimate request for personal information or to get you to click on a malicious attachment from a source you trust. It is one of the cheapest and most effective ways to compromise end user PCs and accounts.
You have a hard working team who likes to get things done after-hours or on the road – that’s terrific! However, here is something you might not know: you should never access company data, file servers or applications through personal devices and home PCs that are not properly managed by us.
There are countless hackers who get up every morning with ONE goal in mind: to find a new vulnerability in a commonly installed software (like Adobe Flash Player, Java plug in or Google Chrome) to access your computer.
Like it or not, device manufacturers and application publishers LOVE to add bloat that you don’t need to their products. This inevitably creates more security risks AND slows down your device.