Over the course of the holiday season this year, more than half of the working adults in the United States will be traveling with one or more of their work devices. Unfortunately, only a tiny fraction of those fully appreciate the data security risks inherent in travel, which is a …
Survey Finds Employees Aren’t Improving Internal Security Practices
SailPoint has recently published some new research that will probably give you a headache, if you’re a business owner. It’s been common knowledge for at least a few years now that employees are a company’s weakest link when it comes to data security. From weak passwords, to using the same …
How Much Should You Spend On I.T.?
Technology is an integral part of everyday life and critical to every facet of business. When servers, workstations or other key pieces of equipment are down or inefficient, the impact can be felt company-wide and on your bottom line. There is no magic number when planning your I.T. budget, but …
How Long Before You Experience A Cyber Attack?
According to this year’s Traveler’s Risk Index, published by The Traveler’s Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 percent of survey respondents indicating that they believe a cyber-attack is inevitable. The other statistics in the report …
An Exploited Website Can Cause Apple Products To Crash
Users of Apple tech have a new reason to worry. A security researcher named Sabri Haddouche, who works for an instant messaging app called “Wire,” has published a proof of concept web page. It contains a fatal exploit that can crash and restart iPhones, iPads and any Mac. Essentially then, …
Popular NAS Device May Easily Be Compromised
Western Digital has a big problem, and if you use the company’s “My Cloud” network-attached storage (NAS) storage devices, you’ve got one too. The WD My Cloud service is enormously popular because it’s so convenient, allowing both business owners and individuals to store their files, perform periodic backups, and of …
Malware Reports Continue To Rise
We’ve known for some time now that the next big crisis the internet will have to come to grips with is the dramatic rise of the Internet of Things (IOT). The problem isn’t with the devices themselves, which are enormously helpful and rapidly growing in their popularity. Rather, it lies …
Your Business Email Is Highly Targeted For Attacks
There’s a new report out, authored by ProofPoint, and its findings for business are grim. It’s no secret that businesses of all shapes and sizes are coming under increasing fire from hackers around the world. Now we have hard data that shows us exactly how big of an increase we’re …
Tech Support Scammers Are Advertising Online
Tech Support scams are nothing new, but they are getting increasingly sophisticated. Worse, tech giants like Google are finding it notoriously difficult to detect them. A report recently released by the venerable data security firm, Symantec, indicates that tech support scammers are increasingly integrating call optimization into their schemes, which …
Hacker Requests For Wire Transfers Are Topping Email Scams
Business Email Compromise (BEC) attacks are a major threat, costing business nearly three billion dollars a year. This form of attack primarily targets the C-Suite in order to impersonate them. In the world of BEC attacks, those that employ requests for wire transfers are almost devastatingly effective. Asaf Cidon, the …