Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves [...]

2023-05-09T09:13:40+00:00April 10th, 2020|Security|

How to defend against Mac ransomware

Although a majority of ransomware attacks usually target Windows computers, this doesn’t mean Mac users are completely safe. Ransomware attacks for Macs are a rarity, but they do occur. So how can you prevent ransomware [...]

2023-05-09T08:46:39+00:00November 20th, 2019|Apple|

Is your IT security proactive?

As IT security consultants, we’re stuck between a rock and a hard place. Managed IT services providers (MSPs) such as ours want to provide clients with enterprise-level IT, but that requires that we specialize in [...]

2023-05-09T09:21:07+00:00October 26th, 2018|Security|

HP laptop users beware: keylogger found

Strict parents can monitor their kids’ online activities, law enforcement officers can see your outgoing messages, and some employers can (unethically) check whether employees are on Facebook during working time. All they need to do [...]

2023-05-09T09:30:16+00:00December 20th, 2017|Hardware|

Precautions against WannaCry ransomware

This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the [...]

2023-05-09T09:34:06+00:00May 23rd, 2017|Business|

Mac ransomware and how to defeat it

Cybersecurity experts stumbled into a ransomware variant late last month, but this one doesn’t target Windows devices. The malware, known as OSX/Filecoder.E, encrypts Mac data like any cryptolocker strain many businesses have seen in the [...]

2023-05-09T09:34:10+00:00March 21st, 2017|Apple|

5 great ways to prevent cyber-attacks

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of [...]

2023-05-09T09:36:05+00:00February 15th, 2017|Security|
Go to Top