File-less Ransomware Uses Windows Tools Against You

ransomware warning: files encrypted - global threat alert!

By now everyone knows about ransomware, the dastardly strand of malware that encrypts data (or the drives it’s stored on) and sends the user a message demanding payment in a certain amount of time before the data is deleted forever. To add a little more menace to an already stressful situation, the message includes a […]

Password Protection

deep dive: unix directory structure for efficient file management & navigation. password protection.

Basic Password Protection Password management is one of the most basic ways of securing your network and data. However, a surprising number of people do not practice password protection, leaving their computer systems vulnerable to hackers. Hackers are constantly searching for passwords with which to penetrate your computer network. Phishing attacks, for example, will urge […]

Spear Phishing: Your Data at Risk

young man focused on laptop in modern, sunlit room, embodying productivity and comfort. phishing.

Phishing For Away In   Spear phishing attacks are especially insidious. An attacker targets an employee in an attempt to trick him into releasing confidential data. These attackers may use your public directory to identify a likely target and send him an “urgent” request ostensibly from a higher-up. An employee who thinks he’s fulfilling a […]

Tip of the Week: How to Cut Back on Your Mobile Data Use

connecting with nature: smartphone serenity at sunset. mobile data.

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some […]

Cybersecurity: Never Leave Your Devices Unattended

cautionary theft scene highlights pickpocket risk in the city.

People leave their electronic devices, be they phones or laptops, completely unattended every single day. Of all the ways that your device can be stolen, such carelessness is the most easily avoided of them all.  It is actually rather scary how common it is to see someone just leaving their electronic devices lying out in the […]

Let's Start a Conversation

Watch the video below and find out why you should fill out this form and start a conversation today.

"*" indicates required fields

Name*
This field is for validation purposes and should be left unchanged.