Security best practices for BYOD policies

Bring your own device (BYOD) policies give employees the flexibility to use devices they are comfortable with while allowing businesses to reduce hardware spending. However, BYOD also carries plenty of security risks. Loss or theft of devices – Employees often bring their personal devices wherever they go. This means there’s a higher chance of devices, […]

Ways to safeguard your company’s data

Some of the most well-known companies in the world, including Sony Pictures, Home Depot, Adobe, and eBay, have been victims of cyberattacks. While major corporations like these are high-profile targets for hackers, small- and medium-sized businesses are not exempt from data breaches. And because it may be difficult or impossible to undo any damage caused […]

Kaseya Ransomware Update 2

Following up to our last Blog Post on this topic.

The total number of Kaseya customers affected remains about the same as our last post.

Kaseya has released the patch as scheduled on July 11th, 2021 at 4pm for their VSA software.

As of July 12th, 2021, Kaseya's VSA servers that they run themselves, are back on-line.

Kaseya Ransomware Strike

As you may have heard in the news over the 4th of July weekend, a very widely used tool by Managed Service Providers, including us, called Kaseya VSA was the focus of a ransomware attack on MSP's clients.

Similar to the recent Solarwinds and NinjaRMM attacks in which tools used by IT professionals are used to target the victims, but fortunately the scale here is much smaller and less impactful.

How to protect your network from watering hole attacks

Cybercriminals are getting more creative in infecting computers with malware, and users must step up in order to protect their devices. To stay one step ahead of cybercriminals, you should learn more about their more insidious tricks such as watering hole attacks. Here’s what you need to know about these attacks and how you can […]

The Complete Guide On Switching HTTP To HTTPS

Setting up HTTPS requires many steps; this makes it challenging, especially for inexperienced users. In-depth knowledge of server configuration and encryption is needed to set it up. The steps and components required to switch from HTTP to HTTPS will be introduced to you in this guide.

The 5 types of hackers who want to harm your business

You’ve probably heard it said that not all hackers are dangerous. That’s true, of course. For instance, white hat hackers hack into a system to uncover vulnerabilities and boost its protection against cyberthreats. However, we won’t be talking about white hat hackers in this blog. Instead, we’ll take a close look at five types of […]

Top IT security terms everyone should know

It’s every business user’s responsibility to protect their computers and data from cyberattacks. The good news is that you don’t need to be an IT security expert to keep them safe. You can start increasing your knowledge by learning some of these basic cybersecurity terms. Malware For a long time, the phrase “computer virus” was […]

Protect your Facebook and Twitter from hackers

Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock […]

Find Out If Your Company Is Secure in Less Than 3 minutesSecurity Scorecard
+
ClickCease