Business Information At Risk?  Are All Doors Locked Into Your IT Network?

A penetration test, or pentest for short, is when an intentional attack is made on your business IT systems in order to find security weaknesses and potentially gain access to its functionality and data. Unfortunately, despite the growth of cyber threats too many companies only conduct a penetration test when they have to, or if…

Security and Societal Problems Emerging for Wearable Technology – What’s the Next Move in the Wearable Tech World?

Is wearable technology becoming the new tech toy of choice? It’s definitely a growing area in the world of technology, ranging from health and fitness trackers to smart watches. Other than the fact that it makes us feel like we’re a character in a cool Sci-Fi flick, this gadget is keeping users constantly connected and…

WordPress 3.9.2 Security Release Resolves Potential Vulnerabilities – Update Your Sites Now! 

This just in! WordPress 3.9.2 is now available as a security release for all previous versions. It is strongly advised that you update your sites immediately, as this release focuses strongly on safety and security features that may prevent potential threats. This release fixes a possible denial of service issue in the PHP’s XML processing….

500,000 Victims of Cryptolocker Can Finally Recover Files Without Paying a Ransom

In 2013 antivirus companies discovered a new ransomware known as Cryptolocker. Cryptolocker is a ransomware trojan that targets computers running Mirosoft Windows. Ransomware is the type of malware that restricts access to the computer system it infects, and demands a ransom paid to the creator to remove the restriction. Cryptolocker encrypted files on Windows computers,…

Hold Security Reports A Russian Crime Ring Has Stolen Over a Billion Internet Passwords – Has Your IT Been Compromised?

Hold Security, a firm based in Milwaukee, has reported to the New York Times that they’ve discovered a massive theft of confidential data gathered from more than 420,000 websites, ranging from large household names to small business sites. Taking into account overlap from site to site, they’ve estimated that the Russian crime ring responsible has…

Should You Use a Temporary Credit Card for Online Transactions?

After the recent series of scandals in the United States involving credit card data theft, the U.S. Department of Homeland Security warned retailers about a type of malicious software attacking point-of-sale (POS) systems, called “Backoff.” It is said that this virus is undetectable by most anti-virus software. During the wake of these scandals, recent popularity…

Let Your Out-of-Office Message Do All The Work While You’re On Vacation!

Are you a frequent business traveler? Do you need assistance with creating the best “out-of-office message”? Do you even have an out-of-office message yet? If not, you should consider creating one to satisfy the concerns and inquiries of all your current and future clients as well as other members of your company. Here’s how to…