Could your business go green by switching over to the cloud? Cloud computing has quickly become a popular option for businesses that want to streamline their operations, reduce costs, and become more flexible. Not only that, cloud computing allows for the real possibility of reducing the carbon footprint left by organizations and agencies. The reason …
Category Archives: Cyber Security
Look Out for Juice Jacking!
Don’t charge in public charging stations! It’s convenient. You’re on the go. You’re running low on charge and, lo and behold, there is a charging station, right there, in the middle of the airport, hotel, café, mall, or wherever you happen to be working on the go. So, what do you do? An ordinary person …
LinkedIn vs. Fake Accounts
LinkedIn Takes Action to Tackle Fake Actions Why the fuss? Fake accounts are an issue because they can spread misinformation as well as disinformation (there is a real difference!), they can scam others, they can be used to troll or spam others, they can impersonate someone or an organization and denigrate their reputation. For social …
Three Essential Tools for Security
Three Essential Tools for Cybersecurity for Every Business Keeping the Most Valuable Asset Secure Data is the most valuable asset of any business. Safeguarding and securing it should be one of your main priorities. If you don’t have much or any security in place for safeguarding your data, you should be implementing a minimum of …
A Growing Security Threat: Bot Malware
Bot malware is a growing cybersecurity threat If in talking about bots you begin to think of the amazing and wonderful AI chatbots that have been all over the news lately, we’d forgive you. It’s only a matter of what is most in the forefront of the news that is most in the forefront of …
Your Phone Needs Security Too!
Our Phones are Goldmines If you think about it, our phones are goldmines of private information, from all the financial details, personal messages, banking apps, photos, contacts, etc. that live behind that little glass screen! And if your company or team uses phones for work, they’ll often have access straight into company systems: email, contact …
Cyber attacks are getting bigger and smarter.
Are you vulnerable to cyberattacks? Have you ever tried to buy tickets for a huge event and found that the seller’s website has collapsed under the weight of thousands of people all trying to do the same thing at the same time? The ticket site falls over – usually temporarily – because the server is overloaded …
Continue reading “Cyber attacks are getting bigger and smarter.”
The Dangers of AI
Into the future We’ve all seen the movies about the future, and if you’re “well-seasoned” enough, you remember the Jetsons, who lived in the future all those years ago. The future is intriguing, unknown and mysterious as it, wide open with its seemingly infinite possibilities. In many ways, though, we are already in the “future,” …
Differing Attitudes toward Cybercrime
Kids these days… If you employ anyone between the ages of 16 and 19, you should pay special attention to the cybersecurity training you’re giving your team. It seems that every generation has had some issue with another generation, usually it’s the “well-refined” generation taking issue with the younger generation, saying things like “Those kids …
One Phish, Two Phish, Old Phish, New Phish
Avoid a devious new phishing scam Another day, another dollar…into the pockets of scammers… How? How could this possibly be? Cybercriminals are smart–and only getting smarter. How? By impersonating highly trusted brand names. It all starts with a convincing-looking email. There’s problem number one. Problem number one: a convincing-looking email You got an email and …
Continue reading “One Phish, Two Phish, Old Phish, New Phish”