FaceTime and iMessage just got more secure

FaceTime and iMessage just got more secure

Whether we use them for business or pleasure, we all want the confidence that the online services we use to store files, post life updates or check our email are given adequate security protection to safeguard our information. But since high-profile breaches such as the celebrity photo leaks of 2014, the security of Apple platforms has been in the limelight.

What is Poweliks and why should you care?

What is Poweliks and why should you care?

As far as viruses, worms and other security infections go, there are probably none quite as frustrating as Poweliks. While most threats can wreak havoc on your computer system and cause untold damage to your business as day-to-day processes are interrupted by unstable IT, information leaks and data losses, the majority at least leave a trace of their work that enables them to be detected and ultimately removed.

What to learn from Sony’s security breach

What to learn from Sony’s security breach

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations.

Spear phishing attack uncovered

Spear phishing attack uncovered

There are so many ways that hackers can gain access to your computers and systems it boggles the mind. One of the more popular tactics employed is the increasingly common spear phishing. In early December 2014, news broke of a new, super savvy, spear phishing campaign that had succeeded in scamming top Wall Street companies and could be a danger to small businesses as well.

Regin – how bad is it?

Regin – how bad is it?

Spend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed it, the intended targets, and where it is most prevalent. In early November, news broke about a mystery security threat called Regin that has been around for years, but which experts seem to know comparatively little about.

Looking at Net Neutrality

Looking at Net Neutrality

In many western countries we are blessed with a free and open Internet, but in the US there is a battle currently raging over the idea of Net Neutrality. Chances are high that you will have heard this term thrown around by various experts and media outlets.

CryptoWall: a new security threat

CryptoWall: a new security threat

Is your business secure from the latest malware and security threats? The truth of the matter is that there is always a chance that your business and systems can be attacked and breached by a variety of security threats. One of the more common threats of last year was a nasty piece of ransomware called Cryptolocker.

5 Ways to stay safe online

5 Ways to stay safe online

One of the biggest business technology trends of the past half decade or more is the increasing amount of business that is conducted online. These days, many businesses have integrated online solutions into daily operations and have reaped the benefits.

Shellshock 101: What is it?

Shellshock 101: What is it?

Earlier this year news broke of one of the most widespread and potentially devastating bugs to-date – Heartbleed. While heartbleed was massive and companies are still dealing with the fallout to this day, news has recently broke of an even bigger potential threat: Shellshock.

Business security: 5 Common flaws

Business security: 5 Common flaws

With the ever growing number of security threats faced by businesses around the world, the vast majority of business owners have adopted some form of security measures in an effort to keep their organizations secure. But, how do you know the measures you’ve implemented are actually keeping your systems safe? Here are five ways you can tell if your security measures aren’t sufficient.