PC Maintenance is cheaper and safer. A few reasons why.

How much do you think it costs you, NOT to maintain your PC?

Now you can secure and maintain your computers and gain peace of mind for less. Learn More Here

IngeniousGeeks.com learn more here

How much do you think it costs you, NOT to maintain your PC?
Join the conversation on our Facebook Page! 

Google now has a Cybersecurity Company, Chronicle

Chronicle will initially offer two services: The VirusTotal anti-malware intelligence service, and a cybersecurity intelligence and analytics platform.

Inc.com click the link to read the rest of the story?

What do you think of Google’s entry into the world of Cyber Security offerings?
Join the conversation on our Facebook Page! 

In 2017 only 2% of small businesses actually secured their systems with proper protection.

Find out why and what they can do about it.

You can secure and maintain your computers yourself and gain peace of mind for less. https://bit.ly/2Li84sy

 

IngeniousGeeks.com learn more here

Are you still using 20th Century technology to keep your computer safe?
Join the conversation on our Facebook Page! 

Invisible threats to old-school endpoint protection software

Fileless security threats—also known as “non-malware” attacks—leverage RAM, the Windows system registry, and even PowerShell and the Windows Management Instrumentation (WMI) module to kick off multi step “attack chains.”

ChannelProNetwork.com click the link to read the rest of the story?

How are you dealing with file-less attacks?
Join the conversation on our Facebook Page! 

U.S. intel chief warns of devastating cyber threat to U.S.

The U.S. intelligence chief warned on Friday that the threat was growing for a devastating cyber assault on critical U.S. infrastructure, saying the “warning lights are blinking red again” nearly two decades after the Sept. 11, 2001, attacks.

Yahoo.com click the link to read the rest of the story?

Could your business survive such an attack?
Join the conversation on our Facebook Page! 

5 new cyberthreats pop up every second, here’s how to protect yourself

The rapid growth suggests that cyber criminals are drawn to the ease of infecting a user’s system and collecting the payments…

Techrepublic.com click the link to read the rest of the story?

How are you protecting yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Ransomware: An executive guide to one of the biggest menaces on the web

Everything you need to know about ransomware: how it started, why it’s booming, how to protect against it, and what to do if your PC’s infected.

zdnet.com click the link to read the rest of the story.?

What have you done to protect yourself from a ransomware attack?
Join the conversation on our Facebook Page!

New Windows malware provides complete control over its victims

Mylobot incorporates a delaying mechanism which waits for two weeks before making contact with the attacker’s command and control servers — another means of avoiding detection.

ZDNet.com click the link to read the rest of the story.

Have you been part of a botnet in the past?
Join the conversation on our Facebook Page!

Deadly attacks feared as hackers target industrial sites

Security

“This is no longer about data theft or business disruption. Someone can get hurt. It’s about physical consequences,” said Dan Scali, senior manager for FireEye’s industrial control system security consulting practice.

TheHill.com Click the link to read the rest of the story.

What contingency plans do you have if your business is disrupted?

Join the conversation on our Facebook Page!

Windows warning: Tech-support scammers are ramping up attacks, says Microsoft

Security

The FBI has recently seen a new trend emerging for scammers to retarget past tech-support victims by posing as government officials or law enforcement, and offering assistance recovering lost funds for further fees.  Some scammers also threaten legal action if victims don’t pay to settle outstanding debts for tech-support services.

zdnet.com Click the link to read the rest of the story.

Have you been scammed?

Join the conversation on our Facebook Page!

Bad bots detected on 100% of web login pages, here’s how to protect your business

All websites with login pages have been hit with bad bot traffic and face Account Takeover (ATO) attempts, according to a Tuesday report from Distil Networks.

techrepublic.com Click the link to read the rest of the story.

Are you sure your business website is safe from attack?

Join the conversation on our Facebook Page!

This is how it feels to face a major cyber attack

Intense, stressful, petrifying: those are just some of the words used to describe what it was to be at the center of some of the biggest and most high profile cyber attacks to take place over the last year.

ZDNET Click the link to read the rest of the story.

Has your business been crippled in a Cyber Attack?

Join the conversation on our Facebook Page!

Nearly everything in the Facebook ‘hacking’ reports are wrong

two key points to remember…

  1. None of what I just described involves ‘hacking’ Facebook or exploiting a bug. Instead, it all revolves around the use of a feature that Facebook provided to all developers and (at least) tens of thousands took advantage of.
  2. The data collected was not internal Facebook data. It was data that developers (s̵c̵r̵a̵p̵e̵d̵ ) accessed* from the profiles of people who downloaded their apps (and their friends).

Medium click the link to read the rest of the story.

Does it bother you that they sell what should be your information?

Join the conversation on our Facebook Page!

New brute-force attacks on Microsoft Office 365 Users!

How safe are your passwords?

All login attempts came from instances hosted on cloud service platforms and targeted 48 businesses. The “slow-and-low” pace of attacks indicates threat actors were trying to stay under the radar; for each business, only a handful of senior employees were targeted. All those who were hit have been notified.

 

Dark Reading Staff  Click the link to read the rest of the story.

How safe are your passwords?

Join the conversation on our Facebook Page!

 

‘KnockKnock’: New Attack on Office 365 Discovered

Do these new attacks trouble you?

Microsoft’s Office 365 suite of cloud applications is now the most popular cloud service in the world by user count. While this has fast-tracked Microsoft’s path to becoming a cloud-first enterprise software company, it has also put a bulls-eye on Office 365, making it a target of choice for hackers. …
KnockKnock has been active since May 2017 and is currently still active. To go undetected, the hacking activity occurs in short stints, averaging 3-5 attempts of guessing the password of the system account before moving on to a different account within an organization. Moreover, it doesn’t display the same level of activity across multiple organizations. As it ramps up its number of attempts in one organization, it ramps down in others, further making detection difficult.

Tripwire Click the link to read the rest of the story.

How do you keep up with latest attacks on your business?

Join the conversation on our Facebook Page!