Security

Screen Shot 2021-08-20 at 1.07.19 PM

Critical IoT Security Vulnerability

Security vulnerabilities in millions of Internet of Things (IoT) devices, including connected security cameras, smart baby monitors and other digital video recording equipment, could allow cyber attac...

pass

Want a strong password? Here’s how to do it the right way

Bad passwords are easy to remember, but also easy to guess and that can give an attacker access to your online accounts. That’s why the UK’s National Cyber Security Centre (NCSC) recom...

What is a VPN and why do you need one? Everything you need to know!

Whether you work from a traditional office, home office, your iPhone, or on the road, a VPN is one of the best ways to protect yourself from data breaches on the internet, especially when using public wi-fi net...

Capture

Cybersecurity assessments

Having a security assessment set up can offer peace of mind with technology. Cyber threats are hidden everywhere, by having a third party cybersecurity one can protect their data and other sensitive information...

3.9_-_David_Shelley_-_YT

Why Having the Right Kind of Password Is Important

Our online passwords protect some of our most important data; here’s how you can protect them. Having the right kind of password is important, but how frequently it is changed matters a great deal too....

Office 365 Accounts Targeted Using OAuth Apps – Phishing

A new and interesting phishing campaign has been discovered that doesn’t target a recipient’s username and password, but rather uses the novel approach of gaining access to a recipient’s Offic...

US Government Bitcoin Ransomware Attack

More than 20 municipalities in the US have been hit by ransomware attacks this year alone, the software has grown rapidly by an internet worm that spreads copies of itself by hacking into other computers on a n...

Microsoft Issues – Be Mindful

Microsoft has released security updates that are impacting some security AV vendors, causing some of their customers using Windows 7, Windows 8.1, Windows 2008 R2, and Windows 2012 to occasionally experience sy...

Security is Build in Different Layers

Network and Computer Security is build in different layers of solutions to ensure you are truly protected. Too often I walk into meetings with CEO/CFO’s that claim they are secure due to being on a single...

Dangerous USB Cable – Hacker Tool

Some hackers are getting creative in getting into people’s system by leveraging USB cables that have a Wifi Card in them which hallway the hacker the ability to access remotely and be in your local system...