5 IT Security Best Practices

5 IT Security Best Practices

The terms computer viruses, ransomware, and trojan horses frequently evoke fear and dread on the part of business owners and operations managers.   This may be due in large part to a belief that since they probably can’t understand how they work, by default,...
Phisherman’s Blues

Phisherman’s Blues

Having recently received some phishing emails, I thought I’d share how things went… To start with, what is phishing? It’s an attempt by an imposter to trick you into giving them money or sensitive data through email.   Fortunately, we’ve...
Ransomware Part 2: Quick Video Overview

Ransomware Part 2: Quick Video Overview

I know I know, its only 2 weeks since the last post about Ransomware. But this time we have a cool video! Also, businesses continue to be targeted, and worse, pay the ransom demanded. Our security expert friends at ESET created this excellent 3 minute video which...
Ransomware and how to protect your business

Ransomware and how to protect your business

More businesses are falling victim to ransomware attacks on their computers. This happens when hackers install malware (malicious software such as “cryptolocker) which renders the data inaccessible. The hackers usually demand a payment to restore the data, and many...