Tag Archives: Cyber Security

Everyone Needs to be Responsible for Cyber Security

The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , , , | Leave a comment

Did “Russian speaking operatives” create the Red October malware to invade specific organizations’ computers, networks and smartphones?

Last October, a world-name in IT anit-virus security and research, Kaspersky, revealed the workings of five-year old malware program hitting on networks throughout “diplomatic, governmental and scientific research organizations,” according to a post on SecureList.org, “The Red October Campaign…An Advanced … Continue reading

Posted in Cyber security, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 2)

In our last article, we talked about how having a social media account can leave you exposed to potential hacks from cybercriminals who are looking to take advantage of your friends and followers for scams and spam. Now, let’s examine how the material you post online can be used against you by these same cybercriminals. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 1)

In this first of two articles, we will take a look at how your social media can be used by hackers and why it is so vulnerable. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

What To Do When You’ve Been Hacked?

It is imperative that you know exactly how to deal with a cyber security hack attack on your system. Having a plan in place ahead of time will prevent fumbling and confusion in the event that a hack does take place. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , | Leave a comment

Is Bringing Your Device to Work a Good Idea?

Personal laptops, smart-phones, and tablets are becoming quite common in corporate America, making for headaches for IT departments who have to contend with new issues that would have been unheard of before. Here are some issues that must be addressed as companies examine developing a Bring Your Own Device policy. Continue reading

Posted in Cyber security, IT and Computer Security, Smart Phone Hacking, Uncategorized | Tagged , , , | Leave a comment

How Cyber Security Training Can Protect Your Business From Hackers

Nowadays, almost every business needs a corporate website to function. When your business depends on a network to run, it is also exposing itself to a lot of risks. Network security breach is one such risk. When information about your … Continue reading

Posted in Cyber security, IT and Computer Security | Tagged , , , | Leave a comment

Will 2013 Be Like 2012?

Here is a look back at some of the top predictions of the security issues for 2012 and what they may portend for the year to come. Continue reading

Posted in Cyber security, IT and Computer Security | Tagged , , , , , | Leave a comment

Cyber Security for Businesses – Part 2

Every second after a cyber attack is critical. It is important to have a rapid-response plan in place to protect both you and your customers and clients. Here are the steps involved in handling a security breach. Continue reading

Posted in Cyber security, Uncategorized | Tagged , , | Leave a comment

Stop. Think. Connect. Cyber Security for Businesses

According to the Department of Homeland Security, almost half of all cyber attacks are against small businesses with less than five hundred employees. Perhaps more shocking, only 52% of small businesses have a cyber security plan and 40% have no response plan in the event that they are attacked by hackers. Continue reading

Posted in Cyber security, Uncategorized | Tagged , , | Leave a comment