hackers

These 5 types of hackers are a threat to SMBs

Malicious hackers are motivated by different things. Some do it for fun, some want money, and others just want to end your business. Getting to know how they behave and what drives them informs how you must defend your organization against them. Script kiddies In terms of skill, script kiddies (or skids, for short) are […]

These 5 types of hackers are a threat to SMBs Read More »

Security, , , , , , , , , , ,

The threat of distributed spam distraction

You wouldn’t think that cybercriminals would carry out their nefarious schemes in plain sight — except that they do and you’ve probably already fallen victim to them. Learn all about a scheme called distributed spam distraction (DSD) and how malicious actors are using it to steal valuable information from their victims. What is DSD? DSD

The threat of distributed spam distraction Read More »

Security, , , , , , , , ,

4 types of hackers to watch out for

Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of

4 types of hackers to watch out for Read More »

Security, , , , , , , ,

Hackers use browsers to get credit card info

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient. Unfortunately, it

Hackers use browsers to get credit card info Read More »

Security, , , , ,

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to protect your network from a security threat is to understand it, here’s

Ransomware to begin self-propagation Read More »

Security, , , , , ,

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you

Understand these 4 types of hackers Read More »

Security, , , , , , , ,

4 BYOD security risks you should address

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD poses a

4 BYOD security risks you should address Read More »

Security, , , , , , ,

The true story of an SMB attacked by hackers

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times recently ran an article telling the story of a

The true story of an SMB attacked by hackers Read More »

Security, , , , , , , ,
Scroll to Top