Call: 888-685-1337 | 806-350-8324

Blogs

Carbonite Users Targeted In Password Reuse Attack

Mon, 06/27/2016 - 09:31 -- Kayla Smith

It was only a matter of time.

In the past few weeks, the 713 million login credentials that were stolen from separate attacks on Myspace, Tumblr, LinkedIn, and others have been put up for sale online. Now, it appears that hackers have purchased those credentials and are using them to attempt to break into other sites, notably Carbonite, a cloud backup service, and GoToMyPC, a remote login service, according to SC Magazine.

Business Networks Increasingly Plagued By Malware

Tue, 06/21/2016 - 11:31 -- Kayla Smith

Check Point, a security research and technology company, announced that they discovered a 15 percent increase in May in the number of global malware families. They detected 2,300 active and unique malware families that specifically target business networks. The malware families perform a wide range of malicious activities including (but not limited to) keylogging, stealing credentials, downloading more malware, performing remote operations, and installing fraudulent applications.

How To Permanently Delete Files From A Hard Drive

Tue, 06/21/2016 - 08:14 -- Kayla Smith

Sometimes you need to permanently delete data from a hard drive - maybe it is credit card information that was never supposed to be stored or maybe it is old patient data that is required to be deleted after a certain amount of time. Either way, since there are regulations governing how this data is stored, there are regulations governing how it should be deleted to ensure that it is 100% gone.

Cisco Small Business Routers & Firewalls Open To Hacking

Mon, 06/20/2016 - 09:19 -- Kayla Smith

A critical unpatched vulnerability remains in three models of Cisco small business routers and firewalls that allows hackers to take control of the devices. If left unchecked, hackers can send an unauthenticated HTTP request and gain the highest amount of privilege on the device. They will then have complete control of the device, according to IT News. 

10 Tips For HIPAA Compliant Technology Solutions

Tue, 06/14/2016 - 11:54 -- Kayla Smith

HIPAA compliance is not something that you want to mess around with. Infractions can cost businesses up to $250,000 in fines, depending on the severity of the violation. HIPAA stands for Health Insurance Portability and Accountability Act and its main purpose is to protect private patient health information. It is important for businesses and organizations to understand the fundamentals of HIPAA rules so they can remain compliant, especially when it comes to technology solutions.

University Pays $16000 To Recover Data Held Hostage

Mon, 06/13/2016 - 11:25 -- Kayla Smith

The University of Calgary in Canada paid almost $16,000 dollars ($20,000 Canadian) to retrieve back the files that were stolen and held for ransom by hackers for over a week. Luckily, the bad guys cooperated and gave the university the decryption key to unlock the files (which hasn’t been the case for all ransomware victims). They do not know if the attacker was one person or a group or if it was local or international. They do believe the source was from outside of the university.

catmandu Is Hiring! - Social Media Manager Employment Opportunity

Thu, 06/09/2016 - 13:05 -- Kayla Smith

We are looking for the perfect person to join the catmandu team! At catmandu, we have a unique company culture. Our company motto is that “everything matters.” We believe in putting the customer first above all else but we also believe in creating a fun, well-balanced work environment in which our team members can find growth, new opportunities, and fulfillment. We only hire team members that are top notch in their skills as well as in their interpersonal skills. But it’s not all about work! We also have a ton of fun together both inside and outside of the office.

How To Easily Recognize A Malicious Email

Tue, 06/07/2016 - 17:31 -- Kayla Smith

The occurrence of phishing emails rose 789% in the first quarter of 2016, according to a new report by PhishMe. To learn more about what phishing emails are and the profound affect they can have on businesses, check out this blog. In it, we give our tips for proactively combating phishing scams and one of those tips is to make sure that employees can easily understand what a phishing email looks like. When they are sitting in front of their computer, combing through their inbox, they need to be alerted of fishy activity. The only way for them to understand is to education them. The chart below explains what a malicious email might look like or contain.

Inside A Russian Ransomware Hacking Ring

Tue, 06/07/2016 - 11:04 -- Kayla Smith

Hackers have been able to make nearly six-figure salaries by encrypting the data of individuals and businesses and keeping it until a sum of money is paid by the victim, a process known as ransomware. According to a new report by internet security firm Flashpoint, hackers can make up to $7,500 per month and $90,000 per year through ransomware.

Pages

Call Today:
806-350-8324

Subscribe to RSS - blogs