How to Protect against Phishing email scams

credit card held up to computer monitor for phishing scam

Phishing scams are one of the most popular tools in a cyber criminal’s arsenal today, given the ease with which they can deliver their attack through the relatively undefended route of email. Email breaches come in a variety of forms, but predominantly involve the use of a false identity – creating trust between the recipient…

Read More

6 Things You Should Have In Place to Protect your Systems

tools to protect IT network

In the modern digital age, our businesses need the security and reliability of our IT systems and infrastructure. Any outage or loss can seriously disrupt the efficiency and security of business operations, potentially creating financial loss, and breaching industry compliance obligations. Where to begin The security of your IT should be a priority but how…

Read More

Your Own Employees are Your Biggest Threat

cyber security

Your Own Employees are Your Biggest Threat – and Last Line of Defense Against a Ransomware Attack on Your Business Major ransomware attacks are on the rise across the country, not just taking down single businesses, but entire infrastructure systems. The cybercriminals are gaining in sophistication, finding more clever ways to hack into your network.…

Read More

Ransomware- The Rise of Cyber Extortion in Healthcare

Today, it’s almost impossible to say the word “malware” without talking about ransomware. It is one of the most common and destructive forms of malware online today. Thieves take over your computer systems and hold your files hostage until you pay the ransom. Even if you decide to pay up, there is no guarantee you’ll get your…

Read More

Top 5 Security Cyber Security Threats to Your Small Business

I hate to say it, but the bad guys are getting really good at taking advantage of businesses, and they’re making a mind-boggling amount of money off it. So, it’s not going to slow down, it’s just going to escalate. I want to let you know what the biggest cyber threats are, according to Webroot’s…

Read More