Is fileless malware a threat to you?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact. What’s certain is statistics don’t lie, and as […]

Gooligan malware wreaks havoc on Android

Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the very successful Ghost Push malware that infected more than four million phones in 2015. This time the point of attack is the Google account. The malware does not attempt to glean info, but rather to […]

Vicious malware spreads through app stores

Android developers are on the lookout for a malicious malware that is attacking app stores and users across the United States, France and other European countries. The malware, known as DressCode, is particularly dangerous to corporations that allow employees to use their own devices for work. Read on to find out more about the DressCode […]

9 essential cybersecurity phrases

As with all technology, trendy phrases come and go with the passing of every IT conference and newly released virus. And when dealing with cybersecurity, keeping up with them all can mean the survival — or demise — of a business. If you’re looking for a list of the industry’s most relevant terms, you’ve come […]

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If […]