Monthly Archives: September 2017

How To Install Sophos Antivirus On A Linux Server

If you have a Linux server that serves up files to users on your network, you might need a bit of extra protection. Here's how to install and configure Sophos AV on your Linux server. You might think your Linux server is invulnerable to malicious code. You're wrong. Although the platform itself may not be [...]

By |2017-11-20T19:18:20+00:00September 29th, 2017|Uncategorized|0 Comments

10 Of The Most Dangerous Malware Threats On The Internet Today

​Not every malware threat makes the news It isn't often that an outbreak like WannaCry hits the tech world, and when it does there's plenty of attention devoted to killing it. High profile malware doesn't typically last that long because of the amount of attention it receives, but for every malware flavor that dies due [...]

By |2017-11-20T19:18:20+00:00September 29th, 2017|Uncategorized|0 Comments

7 Windows 10 Security Features That Could Help Prevent Cyberattacks Against Your Business

With ransomware and spyware on the rise, enterprises need to stay vigilant to protect data from attackers. Here are some native Windows 10 security features that can help. As the cybersecurity threat landscape expands, Windows 10 users should be aware of several features included in the platform to help protect enterprise data, Alexander Benoit, [...]

By |2017-11-20T19:18:20+00:00September 29th, 2017|Uncategorized|0 Comments

5 Critical IT Security Questions Enterprises Need To Answer Now

At Microsoft Envision, Microsoft's president and chief legal officer Brad Smith shared some tips for how companies can gut check their own security strategy. Companies must address cybersecurity, or else "sentence ourselves to a permanent state of watching this problem grow worse and worse," Microsoft's president and chief legal officer Brad Smith said in [...]

By |2017-11-20T19:18:20+00:00September 27th, 2017|Uncategorized|0 Comments

Nearly 50% Of Organizations Willing To Pay Extra For Security Guarantee From Cloud Vendors

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found. Even though many businesses move to the cloud for perceived cost savings, 75% of organizations are willing to pay extra for guaranteed security and improved performance, according to [...]

By |2017-11-20T19:18:20+00:00September 25th, 2017|Uncategorized|0 Comments

Report: 99% of Ransomware Targets Microsoft Products

A new report from Carbon Black analyzed 1,000 ransomware samples to learn how attackers are using it and how threats are evolving. The explosive growth of ransomware is bad news for Windows users. Some 99% of ransomware attacks are targeting Microsoft products, according to a report from security firm Carbon Black, released Thursday. Of course, some [...]

By |2017-11-20T19:18:21+00:00September 22nd, 2017|Uncategorized|0 Comments

Cheat Sheet: How To Become A Cybersecurity Pro

If you are interested in pursuing a career in cybersecurity and don't know where to start, here's your go-to guide to salaries, job markets, skills, and common interview questions in the field. As cybercriminals grow more sophisticated and news of major breaches reach headlines nearly daily, cybersecurity professionals are in high demand: There are [...]

By |2017-11-20T19:18:21+00:00September 22nd, 2017|Uncategorized|0 Comments

Using Malware And Infrared Light, Hackers Can Turn A Security Camera Into A Business Spy

The method, identified by researchers at Ben-Gurion University of the Negev, can be used to infiltrate data or perform malicious attacks. Security researchers at Ben-Gurion University of the Negev (BGU) were able to use infrared (IR) light to control the behavior of security cameras infected with malware. The technique was detailed in a research paper published [...]

By |2017-11-20T19:18:21+00:00September 20th, 2017|Uncategorized|0 Comments

Infographic: Who Hackers Target During A Cyberattack

A recently-published infographic from CBTS breaks down the different types of cyberattacks and how your company can stay protect itself. Passwords like '12345' and 'password' aren't going to cut it anymore. Hackers target everyone, including you and your business. A new infographic from CBTS, an IT service management company, titled: Why Your Business Network Is A Hacker's [...]

By |2017-11-20T19:18:21+00:00September 18th, 2017|Uncategorized|0 Comments

How To Design A Network That Meets All Of Your Users’ Needs

At the VMworld 2017 conference, Moffitt Cancer Center CTO Tom Hull talked about how the hospital designed a network that met its users different needs. http://www.techrepublic.com When designing a network, organizations must cater to users' diverse needs. Tom Hull, CTO at the Moffitt Cancer Center (MCC), described how the hospital designed a network that allowed [...]

By |2017-11-20T19:18:21+00:00September 13th, 2017|Uncategorized|0 Comments