Why the Dark Web Matters

Here’s Why the Dark Web Matters

Most of the civilised world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …

Fileless malware: Are you at risk?

Over the past few years, the security industry has been witnessing a rapid evolution in attack techniques, including fileless malware, which uses legitimate tools and services such as existing software, applications, and authorised protocols to carry out malicious activities such as unauthorised data retrieval or data damage. It therefore pays to stay abreast of such threats. What is fileless malware? …

Here’s Why the Dark Web Matters

Here’s Why the Dark Web Matters

Most of the civilized world is on the Internet every day – businesses large and small, governments, educators, adults, children and, unfortunately, criminals. The Internet may seem like a world without boundaries allowing us to find just about any kind of information, learn about other cultures, conduct business across the globe and even socialize with family and friends. Like many …

Reasons to back up your mobile devices

Reasons to backup your mobile devices

Companies such as Apple, Samsung, and others have turned mobile phones into mini-computers that can serve as a substitute for your laptop, or as a storage device which is where having a backup is extremely important. If you’re using a smartphone as a communications and storage device, backing up now would be a wise move. Malware on mobile More than …

The lowdown on cloud security

The lowdown on cloud security

If you’re thinking of transitioning your business to the cloud, consider the security of the platform. While providers would like us to believe that the friendly, fluffy cloud image used to market the service means it is automatically secure, the reality is far different. Just ask one of the nearly seven million Dropbox users who had their accounts hacked. This …

Is your IT security proactive?

Is your IT security proactive?

Do you spend hours obsessing about the inner workings of DNS-layer security, intrusion prevention systems, and data encryption? If you’re not a managed IT services provider (MSP), you probably don’t. Instead, you’re probably looking for a business partner to manage those nitty-gritty details for you. However, there’s one thing you really ought to know: What exactly are “proactive cybersecurity” measures? …

4 types of hackers that may target SMBs

4 types of hackers that may target SMBs

When it comes to cyberattacks, most business owners get hung up on the technical and logistical details, forgetting another important aspect: motive. Why are hackers attacking people and organizations? And whom are they targeting? By answering these questions, you’ll have a better understanding of which of your business’s resources need the most protection. Script Kiddies Skill-wise, script kiddies (or skids, …