Managed Service Providers Reduce IT Security Issues
The concepts of IT security and managed services have become very relaxed. Businesses from small to large are realizing the benefits of working with a trusted managed service provider. Less stress within your daily work life can come from more trust in the smooth operation of all the tools that enable you to perform your […]
Cyber Security Tip of the Day: Wireless Security
Wireless Security Computers of all kinds typically come with hardware built-in that allows them wireless connectivity to the internet and/or network access in which a host of resources are available. On the other side of the coin, there are wireless access points that are administered to allow computers the internet or network access. There are some points to […]
Network Security: Avoid Practices that Weaken Security
Avoid Practices that Weaken Security There’s no way to stop all online attacks, but that’s not an excuse for fatalism. The huge majority can be stopped or minimized. Human error is the biggest source of practices that weaken security, but reducing the damage a mistake can make will prevent most attempts from doing any harm. […]
Internet Explorer Features a Zero-Day Threat
Zero-day threats make headlines, but what are they? Zero-day threats are software vulnerabilities exploited before developers can patch them. One recent case, the Double Kill Internet Explorer vulnerability, was discovered by Qihoo 360 Core Security. This exploit spreads through Word documents, using a Windows VBScript flaw to install a Trojan horse via Internet Explorer. When […]
How to Prevent PoS Breaches
Saks Fifth Avenue and Lord & Taylor are adding their names to the growing list of major businesses that have been cyber attacked. Many of these retailers have had their PoS systems breached, resulting in the potential compromise of information for millions of debit and credit cards. Details about the Attack One distinctive feature of […]