CryptoWall – the next security threat

CryptoWall – the next security threat

Last year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version – called CryptoWall – that has begun to infect users.

Are you suffering from Shellshock?

Are you suffering from Shellshock?

When first announced in April of 2014, Heartbleed was one of the biggest security issues ever uncovered. Companies scrambled to patch systems and ensure they were protected from this problem. While big news, there is a recently uncovered security flaw called Shellshock which could make Heartbleed look relatively small in comparison, and it is a potential problem you should be aware of.

5 Common security issues

5 Common security issues

It’s probably safe to say that the security of your networks and systems is something you are concerned about. In truth, the majority of businesses do have security measures in place. The question you therefore need to ask yourself is if the measures you have implemented are sufficient enough.

Protection from cloud and data breach

Protection from cloud and data breach

Many businesses are turning to the cloud in an attempt to avoid data breaches, which are growing in number as well as intensity. Still, what some businesses might not be aware of is the fact that there are certain parts of the cloud that point to an increased data breach risk.

How to avoid juice jacking!

How to avoid juice jacking!

What do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, it’s time to get a comprehensive view of what juice jacking is and how you can protect your smartphone from it.

1.2 billion accounts compromised

1.2 billion accounts compromised

Since the advent of the Internet, hackers have been actively trying to exploit it. Over the past few years, many have targeted different websites to obtain user account details like usernames and passwords. There seems to be a trend where the number of accounts compromised with each new security announcement is rising.

4 BYOD tips to improve security

4 BYOD tips to improve security

A common issue many businesses face, regardless of their size, is that their computer systems and devices get progressively older and slower, unless they are constantly updated. This can frustrate some employees who may have up-to-date personal devices, so much so that they simply start to bring these devices into the office.

Misguided virtualization security myths

Misguided virtualization security myths

The increasing number of businesses turning to a virtual environment is parallel with cyber criminals looking to breach that security. While many businesses think their virtual servers are safe and secure, some are unaware of major security myths that can leave your business vulnerable to attack.