Is cybercrime gang driven?

A new report from cybersecurity firm Malwarebytes reveals not only an increase in cybercrime in 2017, but also an increasing shift toward gang-driven hacking and cyber attacks. The report, The New Mafia: Gangs and Vigilantes, explains that organized gangs of cyber-criminals are taking advantage of their willingness to intimidate and paralyze victims by stealing sensitive … Continued

Read More
Cloud Computing

Misconceptions about Cloud computing

A key technological growth area in the 21st century has been the development of cloud technologies. From cloud-based file storage and backup platforms to concepts such as “software as a service” (SaaS), more and more companies are using elements of cloud computing in their day-to-day business. But as with any new and developing technologies, it’s … Continued

Read More
Cyber Security threats

Cyber security threats to watch out for in 2018

From worldwide ransomware attacks to data breaches such as that suffered by credit-reporting giant Equifax, 2017 has shown us that cybersecurity threats continue to be a very real danger to businesses of all sizes. With cybercriminals becoming increasingly more sophisticated in their attacks against individuals, businesses, and other institutions, here are what we believe will … Continued

Read More
Managed IT Services Provider can help

Signs you need to partner with a managed IT services provider

More and more businesses are making use of managed IT services, taking advantage of outsourcing certain IT functions to lower operational costs, improve business performance and ensure the highest possible standards of security against cyberattacks and other threats. Could your business benefit from having your IT needs serviced by a managed services provider? Here are … Continued

Read More
mobile device security

How to avoid mobile device security threats

Smartphones and tablets have introduced unparalleled flexibility and versatility to modern businesses, allowing unique opportunities for remote working and connectivity. However, they are not without their risks, and any workplace that utilizes such devices must be sure to include adequate security measures as an element of its overall mobile device management strategy. According to research … Continued

Read More