About admin

This author has not yet filled in any details.
So far admin has created 9 blog entries.

KeRanger, The First Mac OS X ransomware

On a regular basis, you continue to hear about how ransomware has hit a variety of different businesses and their computers/ Windows computers that is!  Well, Mac users, you are not left out of the party anymore.  Last week a new malware known as KeRanger has been reported by Claud Xiao from Palo Alto Networks [...]

By |2017-02-13T20:28:38+00:00March 16th, 2016|Disaster Recovery, Managed Services, Security, Threats|0 Comments

Everyday Is World Backup Day

As we begin this month of March, it is important to note that March 31st is in fact World Backup Day. While business data security should be a top priority every day, World Backup Day comes around once a year to remind us that our data isn’t safe if it is not protected. With so many possible disasters, [...]

By |2016-03-02T18:01:28+00:00March 2nd, 2016|Disaster Recovery, Security, Threats|0 Comments

Tech Tips: Enable Multi-Factor Authentication for Office 365 to Improve Security

Security should always be at the forefront of your mind when it comes to your computer and online identity. After many companies and organizations have been exposed as being vulnerable, more and more businesses are starting to invest increased amounts of money into their network security. How can you help yourself? Simple, and often free [...]

By |2017-02-13T20:28:38+00:00August 26th, 2015|Security, Tech Tips|0 Comments

A Real Life Wargames Global Thermonuclear War

I remember back in the 1983 movie Wargames, watching the WOPR run a nuclear war simulation and seeing the “missiles” flying all over the map hitting every county in the world.  Turn the page to today, I am watching a live threat map from Norse, a cyber intelligence company based in Foster City, CA,  and [...]

By |2017-02-13T20:28:38+00:00May 12th, 2015|Data Breach, Security, Threats|0 Comments

Are Weak Passwords Putting Your Small Business at Risk?

Many articles have been written about weak passwords, yet still many casual internet users and more shockingly, many business users still do not use strong passwords to protect their information. A recent global security study done by Trustwave details the current threats to user data and identifies the vulnerabilities that persist within organizations. The study [...]

By |2017-02-13T20:28:38+00:00April 13th, 2015|Managed Services, Security|0 Comments
Go to Top