Mac Users Face Rising Ransomware Threats
Posted November 15, 2018 in Ransomware, Malware, Data Breach
Apple systems are no longer immune to ransomware. A new study shows Mac-targeted attacks are surging. Learn how to...
Ransomware Hits North Carolina and Connecticut Cities
Posted October 30, 2018 in Malware, Cryptocurrency, Digital Forensics, Ransomware, Bitcoin
Ransomware attacks struck cities in North Carolina and Connecticut, infecting dozens of servers. Learn how...
5 IT Security Best Practices Every Business Needs
Posted October 25, 2018 in Data Breach, Malware, Cloud Security
Protect your business from hacking, malware, and data theft with these five proven IT security best practices. Start...
One Security Trick Nobody Uses (But Everyone Should)
Posted October 24, 2018 in Malware, Data Breach, Cloud Security
Cybercrime costs over $2 trillion yearly, yet one simple security measure is ignored by most. Discover this...
Implanted Microchips: The Future of Digital Identity
Posted October 19, 2018 in Blockchain, Cryptocurrency, HIPAA, Data Breach
Thousands of people in Sweden have implanted NFC microchips for payments and ID. Explore the security and privacy...
Chinese Spy Chips Found on US Server Hardware
Posted October 5, 2018 in Data Breach, Malware, Cloud Security
Tiny Chinese spy chips were discovered embedded in US server hardware. See how supply chain attacks threaten national...
Unsecured Webcams: A Hidden Doorway for Hackers
Posted October 4, 2018 in Data Breach, Work from Home, Malware
Default webcam settings leave you exposed to hackers and criminals. Security expert Craig Petronella explains how to...
Hurricane IT Preparedness Checklist for Business
Posted September 11, 2018 in Data Breach, Cloud Security, Malware
Flooding and power outages can destroy business equipment and data in hours. Use this IT hurricane preparedness...