Don’t let cyber criminals exploit your IoT devices

Posted by - October 23, 2018

It seems that nowadays every device we use is “smart.” We have access to everything from smart speakers to smart vacuums, and their prevalence is on the rise. According to a recent FBI public service announcement, the number of Internet of Things (IoT) or “smart” devices is expected to increase by anywhere between 300% to… Read more »

Security vulnerability iDRACula discovered in Dell EMC servers

Posted by - October 18, 2018

According to a recent servethehome.com article, it has been discovered that one of the most respected brands in the server industry contains a vulnerability in its 13th generation and older PowerEdge servers. This vulnerability, which was brought to light in the STH discussion forums, allows users to bypass the Dell EMC iDRAC firmware protections and… Read more »

What to do in the aftermath of a data breach

Posted by - October 16, 2018

Unfortunately, data breaches occur often. Even if you are taking all the necessary precautions to avoid them, they can still happen. Therefore, it is important to have a plan of action to follow in the event of a data breach. A recent itnews.com article suggests how to best deal with a data breach and avoid… Read more »

Ransomware attack strikes the port of San Diego

Posted by - October 11, 2018

A recent CNET article reports that the Port of San Diego experienced a ransomware attack during the last week of September. The attacker apparently demanded a payment of an undisclosed amount in bitcoins. The attack left employees with limited access to their computers which caused a huge inconvenience for people who needed access to items… Read more »

Don’t get tricked by tech support scams

Posted by - October 09, 2018

Even if you work with a trusted IT provider, you need to be alert for remote tech support scams. Remote tech support scams involve cybercriminals pretending to be a help desk employee from an IT company and reaching out to fix a problem with your computer remotely. Once they are given the credentials needed to… Read more »

Tips on protecting your website from a security breach

Posted by - October 04, 2018

In the current technological age, a website is now the face of an organization. When people hear about a new business or organization, the first thing they’ll do is check out their website. While having a secure, well-functioning website for your organization can help raise the reputation of your brand, having one that is not… Read more »

Tips on how to make your website appear at the top of search engines

Posted by - October 02, 2018

While running a small organization, getting your name out there is critical for your success. While using social media and online advertising are available options, the best way to become recognized by the largest audience possible is to appear at the top or near the top of an online search engine. A recent article from… Read more »

What to look out for to avoid getting hooked by phishing scams

Posted by - September 27, 2018

You probably receive hundreds of emails per day, and more than likely, one of those emails contains malware. According to a recent IT World article, one out of every 244 emails contains malware. This means you need to be on the lookout for suspicious looking emails at all times. Here are a few red flags… Read more »

Safe file-sharing practices

Posted by - September 25, 2018

Many organizations today use file-sharing software to allow for more effective communication and collaboration on documents in the office. While the ability to share files is undoubtedly useful as it improves efficiency, files that aren’t properly protected and land in the wrong hands can lead to serious issues ranging from fraud to identity theft. The… Read more »