What exactly is proactive cybersecurity?

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cybersecurity means, so let’s take a minute to go

By |2019-11-13T15:24:12+00:00October 26th, 2018|Security|

HP laptop users beware: keylogger found

You might be entering credit card details on a website to purchase something online or filling in your personal information to subscribe to a service, thinking you’re safe behind the keyboard. And you probably are -- if the computer you’re using doesn’t have a keylogger installed. But for HP laptop users, chances are they aren’t

By |2019-11-10T03:22:29+00:00December 27th, 2017|Hardware|

Precautions against WannaCry ransomware

The WannaCry ransomware, a type of malware that encrypts a victim’s files and extorts them for money, has already affected thousands of machines worldwide. Unfortunately, the success of this attack is just the beginning. According to security researchers, other hackers will probably develop stronger WannaCry variants in the coming months. And if you don’t want

By |2019-11-14T11:06:12+00:00May 23rd, 2017|Business|

Mac ransomware and how to defeat it

Although most ransomware is designed to attack Windows systems, a new strain is targeting Mac computers. Discovered last month, Mac ransomware OSX/Filecoder.E was found by researchers to behave just like any cryptolocker variant. It would encrypt all data until victims paid the cybercriminals. But here’s the catch: There’s no guarantee that the Mac ransomware will

By |2019-11-14T11:13:41+00:00March 21st, 2017|Apple|

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if

By |2019-11-14T12:59:23+00:00February 15th, 2017|Security|