Close

phishing

Trojans – Devious computer viruses

Trojans

Trojans – Inspired by the art of war Most know the story of the Trojan Horse used by the Greeks to enter the city of Troy and win the war. After 10 years of siege and nothing to show for it, the Greeks constructed a giant wooden horse and hid a small force inside. Pretending […]

Read More

Worms! – Just as slimy in your computer

Worms

A computer worm is a standalone malware program that copies itself in order to spread to other devices. Using networks and security flaws to gain access to its targets. Worms will often cause damage to any network they use, sometimes in the form of bandwidth usage. Unlike viruses which almost always corrupt or change files. […]

Read More

Phishing – Think before you click and how to identify fake emails

Phishing example

Ransomware is on the rise with more than 4000 ransomware attacks occurring every day since the beginning of 2016. (source: https://www.justice.gov/criminal-ccips/file/872771/download) So, in light of this, we thought it prudent to talk about one of the common methods of spreading such devious infections, phishing. Phishing Phishing is the fraudulent practice of sending emails disguised as […]

Read More

Ransomware – Could you get hit?

The short answer is yes. Everyone can be a victim of a Ransomware attack. Small businesses, mid or large sized companies and many other organizations are susceptible. However, your vulnerability can depend on how appealing your data is, how vulnerable your security is and how current your employee training is with regards to email scams […]

Read More