Trends in Business Technology: Looking Back at COVID-19

There’s no doubt that the COVID-19 pandemic created a paradigm shift within business operations. According to trend reports from Malwarebytes, around 70% of organizations had moved at least 61% of their workforce to a work-from-home model. These requirements yielded an increased use of video conferencing and team collaboration software, and [...]

Trends in Business Technology: Looking Back at COVID-19 2021-07-14T15:41:39+00:00

Cyber & Data Breach Insurance: Managing the Risk of Data Breaches with Insurance

Cyber & Data Breach Insurance: What is it and how is it underwritten? When evaluating potential solutions for your organization's cybersecurity program, you are likely only considering the ones that directly protect your computer-related and information systems. This might include controls for network security, application security, and/or information-security. But what [...]

Cyber & Data Breach Insurance: Managing the Risk of Data Breaches with Insurance 2021-10-04T19:38:54+00:00

3 IT Tips for Managing Remote Employees Post-Pandemic

3 IT Tips for managing hybrid remote work post-pandemic The sudden shift to remote work that started in March 2020 has essentially transformed the way organizations run their operations and manage resources. A viral infection that turned into a worldwide crisis led to businesses finding themselves operating in crisis mode [...]

3 IT Tips for Managing Remote Employees Post-Pandemic 2021-03-22T17:32:33+00:00

Cyber Security Explained

These days, it’s not uncommon to wake up in the morning and read headlines like: 300 million user accounts breached after a cyber-attack, Hackers gained access to millions of social security numbers, 500 million personal records were stolen from XYZ hotel servers. An ordinary citizen can assume that, a) he/she [...]

Cyber Security Explained 2020-01-12T21:33:04+00:00

Your Worst Nightmare: Fileless Malware Attack

Your Worst Nightmare: Fileless Malware Attack "By now, everyone pretty much knows what malware is and how it works: Victims receive an email telling them that if they just open the attached PDF, their entire life will morph into heaven on earth. Or they get an email telling them that [...]

Your Worst Nightmare: Fileless Malware Attack 2018-08-29T17:11:57+00:00

Google killed 700,000 malicious apps in the Play Store in 2017

If it seems like every day there is news of a malicious Android app being removed from the Google Play Store, your assumption is actually wrong. It’s closer to 2,000 apps per day. Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications. These [...]

Google killed 700,000 malicious apps in the Play Store in 2017 2018-07-17T22:52:52+00:00

Cryptojacking Up By 8500% in 2017!

What is Cryptojacking? Cryptocurrency is fueling a new kind of cyber attack: cryptojacking. Cryptojacking is the secret use of your computing device to mine cryptocurrency. According to Symantec, Cryptojacking attcks exploded by 8500% in 2017 with Symantec logging 1.7 million in December alone. With only a couple lines of code, [...]

Cryptojacking Up By 8500% in 2017! 2018-05-16T03:34:49+00:00

Business Continuity and Disaster Recovery Planning

Business Continuity and Disaster Recovery Planning Your business’s critical data is always at risk. What kind of risks? How about natural disasters, human errors, hardware failures, and malicious attacks… for starters?! As an informed business owner, you take all the precautionary measures to prevent disasters from happening by keeping your [...]

Business Continuity and Disaster Recovery Planning 2020-01-12T21:34:45+00:00

Business Continuity Planning for SMB

  Depending on the region(s) your business is located in, catastrophes can take the form of earthquakes, floods, building fires/ wildfires, tornadoes, or hurricanes.  These only account for some of the potential natural disasters. Add to that the Hard drive crashes, threats faced from computer viruses, malwares, and hackers, and [...]

Business Continuity Planning for SMB 2018-07-03T22:23:07+00:00