Blog

Does having a backup system reduce your cybersecurity risk?

You have a backup system in place. That is good! (if you don’t, you need to…)  But backing up your data does NOT reduce your risk. Backups help you AFTER you ...

FCC Approves Plans For WiFi 6 To Open Wireless Spectrum

The Federal Communications Commission (FCC) gets a lot of bad press.  Sometimes there are good reasons for that but much of the time there are not really any good reasons.  As the ...

Skype Adds Zoom Feature And Additional Modern Updates

Are you a Skype user?  If so be aware that Microsoft (the company that owns Skype) just added a handy new feature you may want to start taking advantage of right away. ...

T-Mobile Reports Scam Calls Have Increased 116 Percent Since 2020

If you're like most cellphone users,  you absolutely love the automatic call blocking feature that most companies offer as part of their standard service.  A call comes in from a "suspicious" number ...

New Remote Access Trojan Virus Hides In Windows Registry

There's a new malware strain you should make sure your IT staff is aware of.  Called the Dark Watchman, it is a well-designed and highly capable RAT (Remote Access Trojan) paired with ...

Hackers Are Using Big Brand Surveys To Scam Victims

Surveys have long been a playground of hackers and scammers. That's true at any time of the year but it's especially true around the Holidays when such scams seem to attract even ...

You’re at incredible risk if you don’t have a password manager

  If you only do one thing this year to protect yourself from cybersecurity hackers, get a password manager. ...

New Ransomware Named AvosLocker Uses Multiple Tricks In Attacks

There's a new strain of ransomware to be concerned about in the form of AvosLocker. This is from security firm Sophos who warns that the new strain of human-operated ransomware is one ...

Update Your All In One SEO Plugin For Security Patch

Do you own and operate a WordPress website?  Do you also use the "All in One" SEO plugin? If you answered yes to both of those questions, then be aware that you'll ...

What is the Log4j vulnerability?

In simple terms, it is how Java logs its files in programs.  Those programs are usually in systems like services that ...

Get a Quote
Schedule an Appointment
Cybersecurity Guide

Archives