My Website is Down, What Do I Do?

When your website is down, it’s always a surprise. What’s worse, downtime can be expensive in terms of lost productivity, lost revenue, cost to recover, and cost of reputation. Some companies measure the time lost per second when a site goes down because they have so much traffic. However, there are a few things you can do to get past the panic and into solutions to get your site back online.

Is Your Business Running an Older Version of Windows?

While you can still use your computer with the outdated operating system, you will be susceptible to malware triggered by hackers taking advantage of weak or unpatched code.
Before the global attack was stopped, it spread around the world, affecting computers in 150 countries – including computers used in healthcare systems, utilities, and government. On Monday, May 15th, as the world went back to work, the attack picked up speed again.

Facebook Giveaway Scams: Worse than Fake News

Most of these scams instruct you to “like & share” a post in order to enter into a pool of possible winners. Maybe you’ve done it yourself, thinking, “what could it hurt?” Facebook giveaway scams exist for one reason: to get something from you. If you’re overly fond of your personal information (and you should be), avoid these “like & share” schemes.

Five Ways Image-Based Backup is Better for Your Business

An image-based backup preserves a copy of a machine’s operating system, including system state and application configurations, as well as the data associated with that machine. The information captured in this copy is saved as a single file known as an image. Each image represents a single point in time, which allows a restore of a specific file at a specific point if necessary.

Six Risks to Your Business IT Security

Data security is becoming more important as business data is being collected everywhere. Globally, we generate 2.5 quintillion bytes of data each day, a figure that will likely grow steadily in the years to come. In fact, the data generated just within the last two years amounts to 90% of the data currently in existence. The rapid pace of data generation requires a business to stay on top of their data protection strategy. Threats to data security seem to lurk at every turn. But what are the biggest threats to a company’s data?

Does Your Business Have a Disaster Recovery Checklist?

As part of a business continuity plan, a disaster recovery plan is critical to the health of your business. But it’s not enough to merely have a disaster recovery plan – you also need a disaster recovery checklist to make sure that plan is implemented.

Disaster Recovery Planning: Preparing for a Data Disaster

Say the word “disaster” and powerful images come to mind – tornadoes, floods, hurricanes, earthquakes, and the like. But there are more common disasters. A vicious bit of malware that gains entrance into company servers. Even a cup of coffee knocked over onto a keyboard can cause significant problems. And yet, most companies are content to build their business disaster recovery plan for the “someday” of a natural disaster, which is statistically less likely to occur.

Do I need to be concerned about mobile malware?

An iPhone Virus is a real thing If you have a smartphone, and 64% of Americans do, you have more than just a phone – you have a computer in your pocket. There have been volumes written over the years about viruses and malware that affect computers at every level, but not a lot of ink has been spilled over the subject

Security Tips for Wireless Routers

If you have internet service in your home – and many American households do – chances are you’re accessing it via a Wi-Fi connection. The freedom of movement that Wi-Fi provides allows us to access the internet virtually anywhere in our homes, completely cord-free, and we generally don’t give it much thought. But Wi-Fi routers can be the source of a security

CryptoWall Ransomware Is Here to Stay: Please Be Prepared

We’ve written about Cryptowall ransomware before on a couple of occasions (A Ransomware Survival Story; Ransomware Recovery – Be Ready in Advance). Ransomware isn’t new, but it continues to evolve – and that isn’t a good thing. And just in case you’re still not sure what ransomware does…it’s malicious software that renders your files unusable until you pay a ransom. It does

Cyber Security Best Practices

Most of us are content to view the nightly news as something that happens to “other people,” but the recent WannaCry ransomware attack proves that none of us is safe from cybercrime. Nowadays, it’s not the “big” attacks on large companies like Target or Anthem or Sony Pictures that are the biggest threats. Sure, these things may affect important personal information, but

Ransomware Recovery – Be Ready in Advance

Back in February of 2014, we shared our survival story regarding Cryptolocker, an extremely nasty and expensive malware virus that generally spreads through email. Because Cryptolocker was recently in the news again (Warrick County Prosecutor’s Office Admits 2014 Breach), we thought it wise to continue to raise awareness so that you can take steps to protect yourself or your company from similar attacks.

Malware Alert: Beware the Apple iOS “Masque Attack”

iPhone users:  do you want the new version of Angry Birds? Of course you do – and malware developers are banking on that. But your desire for app updates and your trusting nature might lead you to a world of trouble. What is the Masque Attack? Earlier this year, security firm FireEye discovered a significant vulnerability in Apple’s iOS that allows for malware

What is the Dyre Banking Malware Phishing Email?

In the world of cyber-security, you cannot relax your guard, even for a moment. In mid-October 2014, discovery of a phishing scam aimed at obtaining sensitive user account credentials for a number of online services, including banking services, prompted a warning from US-CERT outlining the particulars of this scam. Known as Dyre or Dyreza, this banking malware is a phishing attempt to

Next Page »