Cybersecurity News: Russian Hackers Charged With $100 Million in Cyber Theft

Cybersecurity News: Russian Hackers Charged With Cyber Theft Worth $100 Million

By | Cybersecurity, Email Security, Hacking, News & Updates, Phishing, Training

Anyone who has been paying attention to the latest cybersecurity news might have noticed a big story breaking in early December. Two Russian hackers were indicted in what is considered to be the largest cybercrime spree in history. Maksim Yakubets and Igor Turashev are the leaders of Evil Corp, a…

Read More
Windows 7 End of Life—Here’s What You Need to Know

Windows 7 End of Life – Here’s What You Need to Know

By | Cybersecurity, Windows, Windows 10, Windows 7, Windows Server 2008

It’s officially old news at this point, but thousands of businesses and organizations are still in denial or repeatedly muttering “it’ll be fine” over and over and over. One of the most popular and widely active versions of the Windows operating system—Windows 7—is approaching end of life. Mainstream support for…

Read More
What Is Your Cyber Attack Prevention Plan?

What Is Your Cyber Attack Prevention Plan?

By | Cybersecurity, Email Security, Hacking, Managed Services, Network Infrastructure & Security

Cyberattacks are forefront in the minds of every business owner, regardless of the type of business or the size or the company. No one is out-of-reach for these unscrupulous criminals. Despite the considerable efforts of IT technicians and sophisticated software designed to detect and prevent unauthorized access to your networks…

Read More
Do Your Managed Network Services Include Patch Management?

Does Your Managed Network Services Include Patch Management?

By | Cybersecurity, Managed Services, Patch Management & Updates

Managed network services are a popular strategy for many businesses. Offering advantages such as expert guidance, access to powerful security measures and 24/7 monitoring, they help bring a company’s IT and network infrastructure rapidly up to speed. SMBs especially benefit from access to such technologies, and they represent a valuable…

Read More
Government Hacking and Defending Against Ransomware Attacks

Government Hacking and Defending Against Ransomware Attacks

By | Cybersecurity, Government & Public Sector, Hacking, Network Infrastructure & Security, Viruses, Trojans, Ransomware and other Malware

The number of ransomware attacks against public and private entities in the past few years has exploded. What used to be a somewhat uncommon tactic in comparison to phishing and other social engineering approaches is now taking the central spotlight as cyber criminals become aware of a critical shortcoming existent…

Read More
How to Secure Data with Frequent Backups

How to Secure Data with Frequent Backups

By | Business Continuity & Disaster Recovery (BCDR), Cybersecurity, Data Security & Backup, Network Infrastructure & Security

Nobody likes preparing for catastrophe—however, not preparing for it will lead to disaster when an emergency arises. When exploring strategies for how to secure important files and data, make sure that frequent backups are a part of the plan. Backups may mean the difference between minimal downtime and mitigated damages,…

Read More