Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure.
Some ransomware strains are free to decrypt
How to recover from ransomware in your Mac
While a vast majority of ransomware that’s been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new ransomware strain, OSX/Filecoder.E, which encrypts Mac files and keeps them locked even after the victims have paid the ransom.
Which Office 365 model is right for you?
From Word to SharePoint, Office 365 has a lot offer. But each business requires different features from Office 365. Some may prioritize business analytics, while others may be content with no more than the productivity suite and Outlook. If you’re planning to deploy Office 365, first consider your business needs, then use the information below […]
Updated Microsoft Teams is set for release
Preceding its general availability, Microsoft has recently rolled out a major update for Microsoft Teams — Window’s version of the cloud-based team collaboration tool, Slack. The latest bundle of features will kick things up a notch, allowing you to do more than IM your manager about your weekly meeting or ask your colleagues to remove […]
Malware on Android smartphones
The average smartphone user doesn’t give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone’s physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops particularly for business users, but […]
What you need to know about Cloudbleed
Internet security company Cloudflare revealed a major flaw in their system. The so-called ‘Cloudbleed’ vulnerability leaked customer information from thousands of websites, according to Cloudflare researchers. Fortunately, there have been no signs of exploitation, but that doesn’t mean you should be complacent.
How to Exercise at the Office
Congratulations! You live in a technologically advanced society that makes working almost anywhere easy! So, work has expanded well beyond the traditional 9-5 workday and that has likely resulted in you finding less time to do some other important things like staying physically fit and in good shape.
How IoT will influence businesses
In the near future, the Internet of Things (IoT) is expected to usher in an era of connectivity and efficiency on a global scale. Many small- and medium-sized companies, however, assume IoT has no application to their business. To dispel those false assumptions, we’ve compiled a list of four ways your business can benefit from […]
Advice from a failed disaster recovery audit
We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.
Strengthen Your Business’ Core Muscles with Security Awareness Training
Francis Bacon once quipped that “knowledge is power.” Your business’ security is only as good as your users, so making sure your users have the power they need to keep your information safe is key to your business’ well-being.
Security can be a lot to tackle, considering that it covers everything from locking the doors to being aware of malicious payloads embedded in unscrupulous emails.
- 1
- 2