This fake Google app is really a phishing scam

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done. Even well-trained users are falling for the most recent ploy, […]

A brief history of virtual quarantines

Malware is becoming more sophisticated every day, and we recommend several solutions for dealing with it. One of the most interesting of these is achievable via cutting-edge virtualization technology. Often referred to as sandboxing, this solution is a great way to quarantine and test suspicious applications before exposing them to your entire network. What is […]

Sly phishing attack catching users off guard

You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com…right? Because if you’re not, you could end up exposing your computer or smartphone to a host of malware. The newest phishing attack strategy is the worst of all, and can catch even the most astute users […]

Wikileaks’ charges of government spying

Staving off malicious cyber attackers is already a herculean task, so the last thing you need is to feel exposed from a totally new angle. That’s how many felt after Wikileaks’ accusations that the US government was spying on its citizens. However, the truth is a lot different from what the headlines would have you […]

No Ransom: a place for free decryption

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the further it goes, the more resources are allocated to fighting it. If your data is held hostage, always check these lists for free decryptors first. The state of ransomware in 2017 […]

Mac ransomware and how to defeat it

Although most ransomware is designed to attack Windows systems, a new strain is targeting Mac computers. Discovered last month, Mac ransomware OSX/Filecoder.E was found by researchers to behave just like any cryptolocker variant. It would encrypt all data until victims paid the cybercriminals. But here’s the catch: There’s no guarantee that the Mac ransomware will […]

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, […]

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if […]