Securing mobile devices is challenging. They often have privileged access to sensitive data that they connect to via unprotected network connections. Virtualization vendors are finding ways to include solutions to these problems in their products and they’re perfect for small businesses. Mobile device management and virtualization Mobile device management (MDM) is about controlling how users […]
Smartphones have become so advanced that there’s virtually no business task they can’t handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now. Malware on mobile […]
For businesses, data security is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. While Microsoft Office 365 comes with some security and compliance tools, it still needs the support of data protection best practices. Here are seven you should […]
With cybersecurity threats targeting small and large businesses, solutions that protect mobile devices are no longer a niche service. More work is being handled away from the office, which means more opportunities for security breaches. Virtualization vendors are leading the charge to tackle these challenges with innovative solutions. Mobile device management and virtualization Simply put, […]
Microsoft understands the value of your business’s data and the costly repercussions of losing it. That’s why they’ve released a slew of security and compliance tools for Office 365 subscribers. But given the increasing sophistication and frequency of data breaches, Office 365 cloud security solutions won’t be enough to protect your files. You’ll need to […]
Efficient Escrow of California was forced to close its doors and lay off its entire staff when cyber criminals nabbed $1.5 million from its bank account. The thieves gained access to the Escrow Company’s bank data using a form of “Trojan horse” malware.
Things were going great at Michael Daugherty’s up-and-coming $4 million medical-testing company. He was a happy man. He ran a good business in a nice place. His Atlanta-based LabMD had about 30 employees and tested blood, urine and tissue samples for urologists.
I was reading a blog entry recently from one of our partners that focus on security awareness training. The blog entry was about the number of new variants of crypto-malware that have entered the "market" so far this year. They were aware of 41 new variants and made the disclaimer that the list may not be complete.
In the book Spam Nation, investigative journalist and cybersecurity expert Brian Krebs revealed the single most effective (and relied upon) way cyber crime rings gain access to your bank account, credit cards and identity. Ready for it? Email.
Whether it’s opening an attachment infected with a virus, or a phishing scam where you unknowingly give up your login to a critical website, e-mail still remains the most popular and reliable way digital thieves can rob you blind, steal your identity and wreak havoc on your network.