Close

malware

5 Keys to Disaster Recovery Planning

Backups - Disaster Recovery Plan

According to “IT Pulse” when IT Systems fail, and employees are unable to access their files, 552 employee work-hours are lost annually. That is more than a quarter of the year for a single employee of a typical small business! So how is your Disaster Recovery Plan? How do you define a DISASTER? Disaster doesn’t […]

Read More

Trojans – Devious computer viruses

Trojans

Trojans – Inspired by the art of war Most know the story of the Trojan Horse used by the Greeks to enter the city of Troy and win the war. After 10 years of siege and nothing to show for it, the Greeks constructed a giant wooden horse and hid a small force inside. Pretending […]

Read More

Worms! – Just as slimy in your computer

Worms

A computer worm is a standalone malware program that copies itself in order to spread to other devices. Using networks and security flaws to gain access to its targets. Worms will often cause damage to any network they use, sometimes in the form of bandwidth usage. Unlike viruses which almost always corrupt or change files. […]

Read More

Keyloggers – Watching everything you type

keyloggers

Keyloggers are programs or devices that record every keystroke you make. It can be used on anyone to watch and record everything they type on their PC. It is arguably the most dangerous tool in any cybercriminals arsenal. Used to obtain logins, passwords, emails, credit card numbers, banking information, and other sensitive data. Keyloggers have […]

Read More

Mac malware – Quietly spying on you

Mac malware

Mac’s and Malware Mac, which is not exempt from malware infections, has caught itself a new bug. FruitFly is a malicious piece of Mac malware that has been making its way onto Mac machines for years. This malware spies on its users through the computer’s camera, captures screen shots and logs key strokes. All the […]

Read More

Phishing – Think before you click and how to identify fake emails

Phishing example

Ransomware is on the rise with more than 4000 ransomware attacks occurring every day since the beginning of 2016. (source: https://www.justice.gov/criminal-ccips/file/872771/download) So, in light of this, we thought it prudent to talk about one of the common methods of spreading such devious infections, phishing. Phishing Phishing is the fraudulent practice of sending emails disguised as […]

Read More

Ransomware – Could you get hit?

The short answer is yes. Everyone can be a victim of a Ransomware attack. Small businesses, mid or large sized companies and many other organizations are susceptible. However, your vulnerability can depend on how appealing your data is, how vulnerable your security is and how current your employee training is with regards to email scams […]

Read More

New Ransomware Attack!

The following is an excerpt from an article written by Russel Brandom at Verge: “A major ransomware attack has brought businesses to a close throughout Europe, in an infection reminiscent of last month’s WannaCry attack. The most severe damage is being reported by Ukrainian businesses, with systems compromised at Ukraine’s central bank, state telecom, municipal […]

Read More