Think your password is secure? Think again

The National Institute of Standards and Technology (NIST) created many of the password best practices you probably loathe, including using a combination of letters, numbers, and special characters. The NIST now says those guidelines were ill-advised and has changed its stance.

Consider these points when purchasing antivirus software

If you think cybersecurity protection is only for large enterprises, think again. More and more cybercriminals are targeting small- and mid-sized businesses because of their lack of proper cybersecurity solutions. Viruses, ransomware, and other types of malware are also becoming more dangerous.

Security best practices for BYOD policies

Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks.

Loss or theft of devices – Employees often bring their personal devices wherever they go.

Kaseya Ransomware Update 2

Following up to our last Blog Post on this topic.

The total number of Kaseya customers affected remains about the same as our last post.

Kaseya has released the patch as scheduled on July 11th, 2021 at 4pm for their VSA software.

As of July 12th, 2021, Kaseya's VSA servers that they run themselves, are back on-line.

Kaseya Ransomware Strike

As you may have heard in the news over the 4th of July weekend, a very widely used tool by Managed Service Providers, including us, called Kaseya VSA was the focus of a ransomware attack on MSP's clients.

Similar to the recent Solarwinds and NinjaRMM attacks in which tools used by IT professionals are used to target the victims, but fortunately the scale here is much smaller and less impactful.

The Complete Guide On Switching HTTP To HTTPS

Setting up HTTPS requires many steps; this makes it challenging, especially for inexperienced users. In-depth knowledge of server configuration and encryption is needed to set it up. The steps and components required to switch from HTTP to HTTPS will be introduced to you in this guide.

The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won't be talking about white hat hackers in this blog.

Avoid losing your business to data loss. Get our FREE eBook to learn how.Download now
+
ClickCease