Malware that can infect your Apple computer

If you’ve been noticing strange behavior on your Apple computer lately, it could be infected with malware. Read on to learn about the common types of Mac malware and how to detect them. Types of malware that can target your Mac The following types of malware can be highly disruptive and cause considerable damage to […]

A guide to IT security terms everyone should know

You’ve probably heard the term “malware” thrown around a lot, but what does it actually mean? In this article, we will define malware and a few other commonly used terms in IT so you can better protect your business. Understanding these basic cybersecurity concepts doesn’t require deep IT expertise, so read on. Malware For a […]

Windows 11: First things to set up and customize

Microsoft’s Windows 11 operating system offers a number of improvements over Windows 10, including a new Start menu and a more functional Taskbar. If you have just purchased a laptop running on Windows 11, or are planning to upgrade your current device, then you will need to know how to set it up. In this […]

Are Macs immune to malware?

Windows computers tend to deal with an assortment of malware, but many people fail to realize that even Apple computers face similar threats. As cybercriminals have become more adept at finding exploits and other vulnerabilities, more and more Macs have also fallen prey to malware. Here are some threats you need to look out for […]

Basic cybersecurity terms everyone should know

If the only cybersecurity terms you know are “virus” and “hacking,” now is the time to expand your cybersecurity vocabulary. This will enable you to better understand the variety of risks in the online world and protect your computers, data, and yourself. Here’s a short yet handy list of cybersecurity terms you should know. Malware […]

Setting up Windows 10 on your laptop

Now that you bought a new laptop, you may think that all you have to do is go through Windows 10’s setup. But that’s not true. Your computer is not technically ready for action until you do some customization. Let’s get the ball rolling with the following tips. 1. Set up how your device checks […]

If you’re experiencing a ransomware attack, try these online decryptors

While the threat of ransomware pretty much encompasses all of cyberspace nowadays, not everyone realizes that some ransomware threat responses are readily available for anyone who might need them. Take a gander at these decryptor websites, for instance. They may come in handy sometime. The state of ransomware in 2021 so far Businesses need to […]

Protect your Mac from these threats

Through the years, Apple products have shown resistance to different kinds of malware that Microsoft computers weren’t able to dodge. This, however, does not mean that Macs are invulnerable. Here are some threats you should watch out for to keep your Mac protected. What are the threats that can affect your Mac? There are several […]

This malware can easily slip through Windows 10 security

Sophos researchers are warning Windows 10 users about a new type of malware that can disable and bypass computers’ security software. Known as Snatch, this ransomware is comprised of a collection of tools, including a separate data stealer. Designed to target businesses, this ransomware forces your Windows PC to reboot in Safe Mode to prevent […]

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands. The state of ransomware […]

Configuring Windows 10 on your laptop

Did you just buy a new laptop? Then it probably has Microsoft’s newest operating system, Windows 10, pre-installed. Windows 10 is packed with some interesting features and a revamped user interface. Even if you are an expert at navigating various menus and apps, you may still need help with Windows 10’s approach to computing, so […]

Get ahead of cybersecurity with these basic IT terms

Cybersecurity is everyone’s responsibility. But you don’t need to be an IT expert to know how to protect yourself from a cyberattack. To help you get started, here are helpful terms you need to know so you’re not left in the dark, whether you’re teaching yourself how to update your anti-malware, updating your systems, or […]

Better ransomware protection with Windows 10

The ransomware threat isn’t going away anytime soon, which is bad news for computer users everywhere. Fortunately, Windows 10 has built-in security features to keep you from falling victim to ransomware. Controlled Folder Access This feature allows you to list certain documents and folders as “protected.” Only whitelisted programs can access and edit these folders, […]

Protect your Mac from malware

It is common knowledge that Windows computers tend to deal with an assortment of viruses and malware, but many people fail to realize that even Macs face similar threats. Virus creators have become adept at finding back doors and other vulnerabilities, that even Macs can be targeted. Viruses that affect Macs There are four general […]

Cybersecurity and managed IT services

Businesses can no longer afford to relegate cybersecurity to the bottom of the budget, not with cyberattacks targeting any business regardless of size, strict security, and privacy regulations surrounding data. Businesses with a small or limited budget have the advantage of partnering with a managed IT services provider (MSP) for their cybersecurity needs. Why is […]

Virtual DR protects against ransomware

Ransomware is a type of malware that encrypts your data and makes it impossible to access unless you pay a ransom. While it may appear to be difficult to stop, you should never give in to the hacker’s demands. Before you end up being a victim of ransomware, protect yourself with virtual disaster recovery (DR) […]

How to configure your new Windows 10 laptop

First things first, what should you do with your brand new laptop? You go through the Windows 10 setup, and you’re all done, right? Not really. Your notebook isn’t ready — until you do some tweaking. Let’s get the ball rolling. #1 Check for updates Your new laptop should check for updates automatically, but you […]

Virtual DR for ransomware protection

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions. Virtual […]

2017’s most valuable IT solutions

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most […]

How to avoid entrepreneurial hackers

The WannaCry ransomware strain was created by amateurs who copied and pasted security vulnerabilities from a famous hacker group. It’s no longer a threat if you have updated your computer, but as evidenced by a recent announcement, the hacker group will continue to release dangerous security exploits for anyone to use. Who are the ShadowBrokers? […]

Locky-type ransomware is attacking systems

In 2016, the Locky ransomware infected millions of users with a Microsoft Word file. It was eventually contained, and cyber security firms have since created protections to detect and block previous Locky variants. However, a similar malware is currently spreading worldwide and has so far infected tens of thousands of computers. Quick facts According to […]

Steer clear from these types of malware

You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them apart can keep your business guarded. Viruses Once created to annoy […]

Microsoft’s protection plan for Windows 10

The recent WannaCry and Petya ransomware attacks have caused massive disruptions for Windows users. Although ransomware infection has slowed down in the past few weeks, many experts are saying that this is only just the beginning. Soon, newer and far more dangerous strains of malware will be developed. To help people defend against these threats, […]

Beware: Nyetya is worse than WannaCry

The WannaCry ransomware, which infected 200,000 business globally and made over $100,000 in ransom payments, is said to be one of the worst cyber attacks in history. However, a new ransomware strain named Nyetya is shaping up to be a more formidable security threat. It has already affected businesses globally, and security firms and researchers […]

Windows XP receives security update

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons. […]

Lessons learned from the WannaCry malware

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review […]

No Ransom: a place for free decryption

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure. […]

Statistics for cyber security during 2016

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]

The ransomware that makes you sell your soul

Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of their friends for a chance to rid their own computers of the virus. In cyber security this level of diabolical blackmail represents a new and scary trend for hackers. For more information on how Popcorn […]

9 cybersecurity terms everyone must know

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come […]

Microsoft Office 365 ravaged by ransomware

Picture yourself receiving a phone call from kidnappers saying that they have snatched your only child while demanding a ridiculous amount of money for their safety. Now imagine a similar scenario, but this attack is geared towards Microsoft Office 365 users, complete with a ransom note and an audio message informing victims that their files […]

Ransomware to begin self-propagation

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible […]

Chimera ransomware’s scary tactics

There are numerous strains of malware out there, but one particularly unpleasant one is ransomware. While this malicious software has been around for some time, recently a newer, nastier upgrade was discovered. Posing a threat to businesses of all sizes, the program, called Chimera, has upped the ante when it comes to scaring its victims […]

Scenarios that might require BCP action

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action. By understanding how certain disasters can impact your business, you’ll have a better […]