Just four short years ago Microsoft retired its extremely successful Windows XP operating system (OS). Now it is time for your organization to get ready for the end of the next popular and widely used version. The deadline is approaching sooner than you may think, so let’s break down what your business needs to know, and how to prepare for the end of life of Windows 7 (and Server 2008/Server 2008 R2 too).
Getting Ready for Windows 7 End of Life (and Server 2008/2008 R2 too)
Topics: IT Security, Procurement, How to IT, Windows 7, Microsoft End of Life, Server 2008
This week a pair of major security flaws were discovered with the ability to affect all of your tablets, PCs, mobile devices, and cloud products you may own. Named Meltdown and Spectre, these hardware-based bugs have the potential to allow hackers the ability to steal sensitive information like passwords and other personal information through vulnerabilities in modern processors (Intel, ARM, AMD).
Topics: IT Security
Is an Information Security Risk Assessment Right for My Business?
Unfortunately, most company management still believes that their organization is safe and secure because they are too small to be targeted, are 100% compliant, have never been breached in the past or have already invested resources into staff or other cybersecurity measures – this is just not true...
Topics: IT Security
Help Ransomware: What to Know About Recent Bad Rabbit
A new and major ransomware attack is currently spreading throughout Europe. Although there have only been a small number of reported cases in the US, we wanted to be as proactive as possible and share this information with our valued clients, friends and colleagues. Please read the following information and share it with your family, friends, co-workers and end users.
Topics: IT Security
What to Know About Recent “Petya” Ransomware Attack
A quickly spreading ransomware attack called “Petya” has affected more than 12,000 machines running older versions of MS Windows worldwide. This new ransomware has hit high-profile targets in multiple countries, including the United States. While Petya has not infiltrated as many machines as ransomware WannaCry did in May, it is more dangerous and has the power to create more damage. Here is what you need to know about this potentially dangerous cyberattack and how to keep you and your organization safe.
Topics: IT Security
Mobile Device and Laptop Security: 5 Ways to Stay Safe
The greatest strength of laptops, notebooks and tablets are also their greatest weakness – portability. It’s what makes these tools so useful for mobile professionals, but it is also what leaves them so vulnerable to theft.
Topics: IT Security, Mobile Devices, laptops
What to Know About the 'WannaCry' Ransomware Attack
A major ransomware attack is currently spreading worldwide, impacting over 100 countries. This attack, called “WannaCry” affects Microsoft Windows systems by exploiting a vulnerability called EternalBlue. Microsoft provided a patch for this in March and you can learn more about it here at Microsoft's blog.
Topics: IT Security
Self-healing BIOS, self-encrypting drives, and pre-boot authentication are just some of the leading-edge ways cybercriminals are illegally browsing, stealing, destroying or otherwise corrupting company and individuals’ private information. As the daily news is chock full of headlines of the latest data breach, it is clear the cybersecurity industry is not going to see a decrease in budgetary spending anytime soon.
Topics: IT Security
We all like to think that the Internet is a safe place. Unfortunately email, social media, malicious websites, ransomware and advertisement pop-ups can all pose a threat. Having an antivirus program installed on your computer will help catch and get rid of harmful malware, but it might not catch everything — especially if not installed properly or updated with the latest definitions.
Topics: IT Security
Do This Now: Seven Things to Protect Your Business from Ransomware
The enterprise IT security landscape saw a considerable uptick in the number of ransomware attacks throughout 2016. Although not a new type or style of hack by any means, ransomware has risen in popularity focusing on businesses of all sizes. Here are seven easy things you need to do NOW to minimize the risk and ensure your organization does not become the next victim...
Topics: IT Security, Ransomware