Network Security: Avoid Practices that Weaken Security
Avoid Practices that Weaken Security There’s no way to stop all online attacks, but that’s not an excuse for fatalism. The huge majority can be stopped or minimized. Human error is the biggest source of practices that weaken security, but reducing the damage a mistake can make will prevent most attempts from doing any harm. […]
Internet Explorer Features a Zero-Day Threat
Zero-day threats make headlines, but what are they? Zero-day threats are software vulnerabilities exploited before developers can patch them. One recent case, the Double Kill Internet Explorer vulnerability, was discovered by Qihoo 360 Core Security. This exploit spreads through Word documents, using a Windows VBScript flaw to install a Trojan horse via Internet Explorer. When […]
How to Prevent PoS Breaches
Saks Fifth Avenue and Lord & Taylor are adding their names to the growing list of major businesses that have been cyber attacked. Many of these retailers have had their PoS systems breached, resulting in the potential compromise of information for millions of debit and credit cards. Details about the Attack One distinctive feature of […]
Daily Awareness Tips To Secure Your Computer
Start with these 3 tips on securing your computer and head on back to WheelHouse IT for the rest! Securing your computer and guarding against both internal and external computer risks is a necessity for efficiency in day-to-day operations. Companies are investing a lot to ensure that no loopholes that can affect the service delivery […]
How To ALWAYS Remember Unique Passwords
These days, it is important to realize that EVERYONE is a potential target for hackers. It is not wise to forego your cyber safety because you don’t think you have anything worth taking. Hackers can get access to your snapchat photos that you thought were long gone, they can track and steal your packages on your […]