Internet Security

Home/Posts/Internet Security

Employees: First Line of Cyber Defense or Serious Security Threat?

By |2019-10-29T18:45:52+00:00October 29th, 2019|Cyber Security, Internet Security, IT Security, Security|

Many organizations rely upon their employees prevent cybersecurity breaches. Employees are advised not to click on unknown links and attachments, share their user credentials, or use unapproved applications and services. And for the most part this strategy works — in a recent study conducted by Sapio Research, 79 percent of information security leaders said that [...]

You Need More than Technology to Protect Personally Identifiable Information

By |2019-07-30T18:33:56+00:00July 30th, 2019|Cyber Security, Internet Security, IT Security, Security|

Personally identifiable information (PII) is the holy grail when it comes to cybercrime. Hackers know PII can be sold easily on the dark web or used to commit identity theft. Healthcare and tax-related information is particularly valuable as it enables criminals to commit fraud over a long period of time without getting caught. While more [...]

Cloud Data Protection Isn’t the Cloud Provider’s Job. It’s Yours.

By |2019-07-23T21:38:07+00:00July 23rd, 2019|Cloud computing, Internet Security, IT Security, Security|

Software-as-a-Service (SaaS) solutions such as Microsoft Office 365, Salesforce, Google Suite, Dropbox and QuickBooks have made it easier for small to midsize businesses (SMBs) to adopt cloud services. In fact, Office 365 is by far the most popular cloud platform by user count, with global usage increasing from 34 percent in 2016 to 56 percent [...]

How to Get Executive Support Behind Cybersecurity

By |2019-06-12T03:25:34+00:00June 12th, 2019|Cyber Security, Internet Security, IT budgeting and planning, IT Management, IT Security, Security|

In a recent study conducted by MSI-ACI Europe, 61 percent of IT professionals said senior executives expect more lenient security policies for themselves than everyone else. For 65 percent of study participants, that leniency resulted in more data breaches. The obvious question is, shouldn’t it be the other way around? Given the increasingly perilous threat [...]

Move Over, Ransomware. Cryptojacking Is Emerging as a Top Threat.

By |2019-05-21T20:23:59+00:00May 21st, 2019|Internet Security, IT Security, Security|

Ransomware is still a serious problem. But as awareness has increased and security measures have been enhanced, more hackers are turning to cryptojacking to make money. In fact, the number of cryptojacking attacks was nearly double the number of ransomware attacks in 2018, according to a recent report from IBM Security. Cryptojacking is the unauthorized [...]

Why Standardization Is Critical to Effective IT Operations and Security

By |2019-05-14T20:40:20+00:00May 14th, 2019|Cyber Security, Internet Security, IT budgeting and planning, IT Management, IT Security, IT Services, Security|

When you’re constantly scrambling to keep the lights on and serve customers, it can seem expedient to make a user happy by changing a configuration, installing a new application, or adding a new device or service that the user requested. This may put out the fire of the moment, but it can also make your [...]

Is Remote Worker Security as Effective as Your On-Premises Security?

By |2019-05-07T22:59:30+00:00May 7th, 2019|Internet Security, IT Security, Security, Uncategorized|

Since 2005, the number of Americans working remotely has more than doubled to 3.9 million, and more than one-third of employees are expected to work remotely in the next 10 years. Employee demands for greater flexibility and work-life balance, combined with organizational demands to optimize productivity and keep employees happy, are driving this trend. Clearly, [...]

Windows Server 2008 End of Support is Near. Here Are Your Upgrade Options.

By |2019-04-02T21:25:35+00:00April 2nd, 2019|Cyber Security, Internet Security, IT Security, Security|

Windows Server 2008 has enjoyed a 12-year run, but after multiple extensions, Microsoft will officially cut off support on January 14, 2020. Windows Server 2008 R2, which is just one year younger, will also reach end of support on that date. It should be quite the retirement party with the Windows 7 desktop operating system reaching [...]

Why Steganography-Based Attacks Are on the Rise and What You Can Do about Them

By |2019-03-06T19:27:17+00:00March 6th, 2019|Cyber Security, Internet Security, IT Security, Security|

In January, an image-based malware threat that targets Mac users was discovered. The malware campaign, called VeryMal, uses malicious payloads embedded in ad images, which are delivered through an ad-serving domain. The URL added to the image attempts to trick Mac users into installing a fake Adobe Flash update. When installed, the user contributes to [...]

Research: Unlicensed Software Usage Ticks Down, But Risks Remain

By |2019-02-27T20:03:10+00:00February 27th, 2019|Cyber Security, Internet Security, IT Security, Security|

According to the 2018 BSA Global Software Survey, unlicensed software accounts for 37 percent of all software installed on personal computers, down slightly from 39 percent in 2016. However, the majority of countries in the survey still have software piracy rates of at least 50 percent, and unlicensed software still creates significant risk. More specifically, [...]