At the end of the day, one of the best things you can do for your e-commerce business is to make sure your network and website are as protected as possible.
Fighting Ransomware with Cloud Backups and Data Immutability
Keeping data backups offsite greatly reduces your ransomware risk
2020’s Twenty Tips: Mistakes to avoid
In the first instalment of this two-article series we will be looking at cybersecurity habits to avoid when using your computing devices
Sextortionists return for Christmas – price goes down, threats go up
A week ago, a concerned Naked Security reader shared with us a “send us money or else” email that was a bit different from others he’d received in the past. The claims and the demands followed a predictable theme – one that we call sextortion because of the connection between sexuality and extortion. Simply...
If Your IT Company Can’t Protect Itself – It Can’t Protect You! Pay Attention, This May Sting a Little!
IT Providers are considered high targets and we take this threat very seriously. If we are breached our clients will be the ones victimized.
The Top Clicked Phishing Email Subjects for the 3rd Quarter 2019
Nearly half of all social media-related phishing emails imitated LinkedIn messages. This is a trend we are seeing each quarter, likely because there is a perception that these emails appear to be legitimately coming from a professional network.
Shipping giant Pitney Bowes can be added to the list of victims hit by RANSOMWARE
Pitney Bowes was affected by a malware attack which impacted some systems & disrupted client access to some of our services. We apologize for any disruption to your systems. We are working to restore affected systems. Please visit http://pb.com/systemupdate for updates. (Source Twitter @PitneyBowes).
Most Americans are totally clueless what https:// means
Only 30% knew that starting a URL with https:// means that the information sent to that site is encrypted.
Learn How to Set Google to Self-Destruct your Data
We now have an option from Google to set search and location data to automatically disappear after a certain time. You should use this feature!