phishing attack

Beware! Bad Actors have a devious new way to capture your login details!

As always – Do NOT open that PDF unless you are 100% sure it’s safe!  A new phishing attack has been discovered targeting Adobe users. This campaign uses an email that purports to be from the non-existent service Adobe Cloud, which informs the targeted individual that they have files to download.  The phishing attack carries all the hallmarks of previously …

Ransomware

What is Ransomware

Ransomware, a form of malware, works by encrypting files on an infected system, threatening to erase the data, or blocking access to the system. Once a device’s files are encrypted, the cyber threat actor (CTA) typically offers a ransom amount with contact information on the victim’s screen. CTAs are any state, group, or individual, whose intent is to maliciously exploit …

The Importance of Patching to Cybersecurity

Did you know almost 2/3 of data breaches could be prevented with proper patching? According to the Ponemon State of Vulnerability Response Report, 57% of data breaches could have been prevented by installing an available patch. Patching your IT systems is one of the most important ways to keep your company safe and productive. Your computers, phones, mobile devices and …

Let’s Talk about Data Loss

Let’s Talk About Data Loss Breaking Down Why Your Data Needs Backing Up It’s all too easy to put of getting a backup solution – until it’s too late and your business data has disappeared. Despite the proven pain of data loss, many small to medium businesses (SMBs) continue to stick their heads in the sand when thinking about the …