Blog

What to do in case of a website breach

Big companies like Yahoo, Target, and AOL are often at risk of data breaches because of the large volume of data they collect and store. And when a data breach occurs, individual users are the ones hardest hit. Luckily, there are a few things you can do to mitigate damage from disastrous data breaches.

What Is Cryptojacking

Normally when you think about being hacked you think about someone breaking into your computers to steal sensitive information, or hold you ransom. Cryptojacking is a different kind of hacking, it is where a hacker uses the resources of your computer, mobile device, or other IOT (internet of things) device to mine for cryptocurrency without your knowledge.

Boost Productivity With 7 Office 365 Add-Ons

Microsoft Office 365’s numerous productivity-boosting apps like Word, PowerPoint, Excel, OneNote, and Outlook have allowed businesses to meet client demands efficiently, and its numerous productivity add-ons have enabled users to deliver more in minimal time.

SMB routers targeted by VPNFilter malware

Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally thought.

Apple WWDC 2018: News and updates

The Worldwide Developers Conference (WWDC) has developers meeting and joining discussions with more than a thousand engineers from Apple. What new products did the computer manufacturer have in store for consumers? Read on to find out!

A more personal, faster iOS 12

Apple has focused on improving the operating system’s performance so that iPads and iPhones become more responsive and work faster.

Hide & Seek malware: What you need to know

What’s the worst thing that could happen to your Internet of Things (IoT) devices? If you guessed ‘getting infected with malware,’ you’re right. Many users think IoT gadgets don’t need the same protections required for PCs, laptops, and smartphones -- but they do.

Cybersecurity In The News

Fox 8 Reports on cybersecurity.

Read the article: https://myfox8.com/2018/06/15/triad-group-encourages-business-to-protect-themselves-from-cybercrime/

Want to learn more about the upcoming ISSA conference? Go to www.creativeit.com/issa2018

Chrome: From HTTP to HTTPS

Within the last year, Chrome has helped users understand that HTTP sites are not secure. More websites use HTTPS, a safer protocol, than ever before. So, how can you benefit from this transition? Find out here.

For several years, Google has moved toward a more secure web by strongly advocating that sites adopt the Secure HyperText Transfer Protocol (HTTPS) encryption.