Monthly Archives: February 2018

How to protect Macs from malware threats

Read tips on how to secure Macs from malware, including ransomware, phishing, rootkits, viruses, and more. As malware threats increase in number and frequency, the next big attack could be looming just beyond the horizon. Which OS is the safest? I will give you a hint: If you believe it is Apple, that type [...]

By |2018-02-28T20:22:22+00:00February 28th, 2018|Uncategorized|0 Comments

Six tips to help you avoid targeted marketing

Do you ever get that feeling that advertisers are stalking your every move? At this point, most of us can recite a story from our own personal experience or that of a close friend or family member, where an ad had a particularly spooky kind of relevance. This sort of targeted marketing is not necessarily [...]

By |2018-02-26T15:33:16+00:00February 26th, 2018|Uncategorized|0 Comments

Series of critical bugs in NPM are destroying server configurations

A new version of NPM causes file permissions to be broken under certain circumstances, breaking other applications in the process. A combination of bugs and communication failures from NPM developers has resulted in an outbreak of headaches for system administrators. In version 5.7.0, running sudo npm will result in file permissions being reset across the filesystem, breaking [...]

By |2018-02-23T17:27:11+00:00February 23rd, 2018|Uncategorized|0 Comments

43% of all online login attempts are made by hackers trying to break into your account

Content delivery network Akamai says nearly half of all online login attempts are performed by cybercriminals trying to break into accounts containing sensitive user data. A report from Akamai reveals that 43% of all online login attempts are malicious. The three most-attacked industries are hospitality (82%), high tech (57%), and retail (36%). Credential theft [...]

By |2018-02-22T12:18:15+00:00February 22nd, 2018|Uncategorized|0 Comments

Concerns about data breaches hitting all-time high

Organizations from various industries across the globe are increasingly hip to the magnitude of the problem posed by data breaches, with 44% of them feeling “very” or “extremely” vulnerable to data threats, according to some of the key takeaways from the global edition of Thales’ 2018 Data Threat Report. This is a sharp increase from 30% [...]

By |2018-02-16T19:22:02+00:00February 16th, 2018|Uncategorized|0 Comments

Patch now! Microsoft fixes over 50 serious security flaws

his week saw the second Tuesday of the month, and everyone who is responsible for protecting Windows computers knows what that means: another bundle of security patches have been releasedby Microsoft. This month’s “Patch Tuesday” included security updates for Internet Explorer, Microsoft Edge, Microsoft Windows, Microsoft Office, Adobe Flash Player, and other software, tackling over 50 [...]

By |2018-02-15T15:41:26+00:00February 14th, 2018|Uncategorized|0 Comments

How businesses can keep their employees safe online

From social media to online banking to email, Secure Anchor CEO Eric Cole explains how employee web activity can compromise your company's network. Unfortunately, humans can be a significant threat vector. TechRepublic spoke with Eric Cole, CEO of Secure Anchor, about how businesses can protect their employees while online and at work. "Make employees [...]

By |2018-02-12T17:08:59+00:00February 12th, 2018|Uncategorized|0 Comments

Hackers are now attacking Cisco ASA VPN bug

Cisco researchers are now aware of attempted attacks leveraging a vulnerability in its Adaptive Security Appliance. A major vulnerability affecting Cisco's Adaptive Security Appliance is now under attack by hackers, according to Cisco. Companies that use a Cisco Adaptive Security Appliance should update the software as soon as possible to avoid issues associated with [...]

By |2018-02-09T18:25:33+00:00February 9th, 2018|Uncategorized|0 Comments

How to encrypt files on a Ubuntu server with Tomb

Looking for an easy to use, command line encryption tool for Linux? Jack Wallen walks you through the process of creating encrypted vaults with Tomb. Data security: Two words that cause more and more IT admins to lose their hair. With each passing week, it grows harder and harder to ensure your data is safe [...]

By |2018-02-08T16:35:15+00:00February 8th, 2018|Uncategorized|0 Comments

Why it’s important to avoid FUD fatigue and threat rigidity when making security decisions

Crying wolf to elicit a certain response is poor cybersecurity, contributing to a phenomenon called threat rigidity. Here's advice on successfully guiding your organization through a security incident. Relying on Fear, Uncertainty, and Doubt (FUD) as a security strategy lasts only so long before FUD fatigue—the digital version of the boy who cried wolf—comes into [...]

By |2018-02-06T18:38:09+00:00February 5th, 2018|Uncategorized|0 Comments