Security Spending is Up – But on Old Technologies that Don’t Work

Most organizations are spending their increased dollars on the same type of solutions that they implemented in the past. But these legacy solutions are no longer effective at preventing modern breaches. Today’s attackers use new methods that old security systems don’t detect.

lastline.com learn more here

Are you certain your current security technologies deserve your trust?
Join the conversation on our Facebook Page! 

DeepLocker: will malware weaponize artificial intelligence?

Traditional cyber security solutions, such as bolt-on antivirus software, are no longer enough. Cyber attackers are exploiting every possible avenue to steal data, infiltrate networks, disrupt critical systems, rinse bank accounts, and hold businesses to ransom.

PCMag.com learn more here

Are you adding new layers of protection for your business?
Join the conversation on our Facebook Page! 

PC Maintenance is cheaper and safer. A few reasons why.

How much do you think it costs you, NOT to maintain your PC?

Now you can secure and maintain your computers and gain peace of mind for less. Learn More Here

IngeniousGeeks.com learn more here

How much do you think it costs you, NOT to maintain your PC?
Join the conversation on our Facebook Page! 

Cyber threats are targeting small businesses

Just how big is the risk to small business? Big, very big. According to the Verizon Data Breach Investigation Report, 61% of breaches hit smaller businesses last year, up from the previous year’s 53%.

USAToday.com click the link to read the rest of the story?

Has your business survived a security breach?
Join the conversation on our Facebook Page! 

Invisible threats to old-school endpoint protection software

Fileless security threats—also known as “non-malware” attacks—leverage RAM, the Windows system registry, and even PowerShell and the Windows Management Instrumentation (WMI) module to kick off multi step “attack chains.”

ChannelProNetwork.com click the link to read the rest of the story?

How are you dealing with file-less attacks?
Join the conversation on our Facebook Page! 

U.S. intel chief warns of devastating cyber threat to U.S.

The U.S. intelligence chief warned on Friday that the threat was growing for a devastating cyber assault on critical U.S. infrastructure, saying the “warning lights are blinking red again” nearly two decades after the Sept. 11, 2001, attacks.

Yahoo.com click the link to read the rest of the story?

Could your business survive such an attack?
Join the conversation on our Facebook Page! 

5 new cyberthreats pop up every second, here’s how to protect yourself

The rapid growth suggests that cyber criminals are drawn to the ease of infecting a user’s system and collecting the payments…

Techrepublic.com click the link to read the rest of the story?

How are you protecting yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Ransomware: An executive guide to one of the biggest menaces on the web

Everything you need to know about ransomware: how it started, why it’s booming, how to protect against it, and what to do if your PC’s infected.

zdnet.com click the link to read the rest of the story.?

What have you done to protect yourself from a ransomware attack?
Join the conversation on our Facebook Page!

Your Wi-Fi Security Is Probably Weak. Here’s How to Fix That.

If your router is infected with malicious software, all your internet-connected devices become vulnerable, including your smartphone, computer, smart watch, television and Amazon Echo.

NY Times.com click the link to read the rest of the story.

How old is your router?
Join the conversation on our Facebook Page!

New Windows malware provides complete control over its victims

Mylobot incorporates a delaying mechanism which waits for two weeks before making contact with the attacker’s command and control servers — another means of avoiding detection.

ZDNet.com click the link to read the rest of the story.

Have you been part of a botnet in the past?
Join the conversation on our Facebook Page!

Deadly attacks feared as hackers target industrial sites

Security

“This is no longer about data theft or business disruption. Someone can get hurt. It’s about physical consequences,” said Dan Scali, senior manager for FireEye’s industrial control system security consulting practice.

TheHill.com Click the link to read the rest of the story.

What contingency plans do you have if your business is disrupted?

Join the conversation on our Facebook Page!

Windows warning: Tech-support scammers are ramping up attacks, says Microsoft

Security

The FBI has recently seen a new trend emerging for scammers to retarget past tech-support victims by posing as government officials or law enforcement, and offering assistance recovering lost funds for further fees.  Some scammers also threaten legal action if victims don’t pay to settle outstanding debts for tech-support services.

zdnet.com Click the link to read the rest of the story.

Have you been scammed?

Join the conversation on our Facebook Page!

Bad bots detected on 100% of web login pages, here’s how to protect your business

All websites with login pages have been hit with bad bot traffic and face Account Takeover (ATO) attempts, according to a Tuesday report from Distil Networks.

techrepublic.com Click the link to read the rest of the story.

Are you sure your business website is safe from attack?

Join the conversation on our Facebook Page!

Windows 10: We’re going to kill off passwords and here’s how

Singh said the goal was to make it possible for end users to never deal with a password in their day-to-day lives, and to provide instead user credentials that cannot be cracked, breached, or phished.

ZDNET Click the link to read the rest of the story.

Are you ready to quit using passwords?

Join the conversation on our Facebook Page!

 

This is how it feels to face a major cyber attack

Intense, stressful, petrifying: those are just some of the words used to describe what it was to be at the center of some of the biggest and most high profile cyber attacks to take place over the last year.

ZDNET Click the link to read the rest of the story.

Has your business been crippled in a Cyber Attack?

Join the conversation on our Facebook Page!