Alert: 7-Zip Software Can Leave Your System Vulnerable

7zip_vulnerability_400.jpg

Software vulnerabilities can cause major issues for individuals and businesses. Cisco’s Talos Security Intelligence and Research Group, which is designed as an organization to “protect consumers from known and emerging threats,” has found such a vulnerability with 7zip. The 7zip software is an open-sourced file archiver and decompressor, and has many software developers scrambling to […]

How an End User Might Accidentally Undermine Your Security: 10 Innocent Mistakes

innocent_mistakes_400.jpg

If you’re like every other small business out there, you know that the more employees you hire, the more technology that you have to procure. However, when you have more end-users, you provide more avenues for threats to slip into your network infrastructure unnoticed. When all it takes is one simple mistake from a single […]

Tip of the Week: The Top 5 Mistakes that Ruin Mobile Devices

how_did_you_break_your_phone_400.jpg

To get the most life out of your smartphone, you’re going to want to properly take care of it. Of course, this is easier said than done for a small device that’s prone to being dropped and subject to the many dangers of being transported. Here are five smartphone practices to avoid if you want […]

It’s the End of the Line for Microsoft SQL Server 2005 – Are You Prepared?

microsoft_sql_eos_date_passed_400.jpg

Do you know which database management system is used by your company’s servers? Obviously your end users aren’t expected to know the answer to this question, but this is something that you, as a business owner, need to be aware of. If you don’t keep track of which database software you’re using, you might accidentally […]

It Only Takes 8 Seconds for a Hacker to Open Your Garage Door

garage_hackers_400.jpg

Hackers have proven to be a crafty and suspicious lot, and can take advantage of even the most benign technology to infiltrate networks. However, we don’t often associate them with objects in the physical world. Now, even something as simple as a decade-old communications device can be used to open the right garage doors. The […]

Do You Use Steam for PC Gaming? Watch Out for this New Malware!

steam_malware_problems_400.jpg

Malware has traditionally targeted industries that are exceptionally profitable. For example, hackers like to target retailers for their wealth of financial credentials. One of the most profitable industries, entertainment, is also subject to similar torment, including Steam, the PC gamer’s most valuable tool for gaming binges. Steam is a web-based distribution platform developed by Valve […]

The LG Rolling Bot Can Patrol Your Home or Office [VIDEO]

b2ap3_thumbnail_lg_rolling_bot_400.jpg

Consumer technology continues to grow more versatile and connected, allowing users to perform functions previously unheard of. One such piece of consumer tech is the latest in rolling security bots, the LG Rolling Bot. Basically, what you see is what you get; it’s a rolling security robot that can be controlled remotely through a smartphone. […]

The Super-Creepy Reason Why You’ll Want to Secure Your Surveillance Camera

b2ap3_thumbnail_dvr_iot_issues_400.jpg

With approximately 5.5 million new devices being connected to the Internet everyday, the Internet of Things presents the biggest security challenge to date for IT professionals. Essentially, an IoT device that’s not secured can easily fall prey to hackers, and with so many different devices being connected, it’s easy to overlook a device or two, […]

Alert: New CryptoJoker Ransomware May Be the Worst Ransomware Yet

b2ap3_thumbnail_ransomware_hostage_400.jpg

Modern ransomware is exceptionally dangerous, even by malware standards. Ransomware is capable of locking down important files on a victim’s computer, displaying a massive threat to both business professionals and their networks, as well as the average PC user. While other types of ransomware like CryptoLocker and CryptoWall are somewhat manageable, a new variant called […]

736 Million Records Were Exposed to Data Theft in 2015

b2ap3_thumbnail_stolen_data_problems_400.jpg

2015 saw a significant increase in high-profile hacking attacks in organizations of all disciplines: healthcare, government, and even large entertainment companies all fell victim to data breaches. In light of these attacks, valuable lessons can be learned through analyzing the types of records that were stolen. In 2015, over half of all records exposed to […]

Why You Need to Think Through Which Employees Have Access to What Files

b2ap3_thumbnail_windows_admin_400.jpg

It’s clear that your IT department should have administrator privileges with your business’s technology, but the average employee is another story altogether. Administrator privileges provide users with the ability to do many things, such as install programs and access admin settings. Administrator privileges are exactly what you want to keep users away from, and it […]

Tip of the Week: How to Add a PIN to Your Windows 10 Login

b2ap3_thumbnail_windows_10_pin_400.jpg

The fact that so many businesses are rushing to take advantage of two-factor authentication displays how the password has lost its edge as a security credential. Passwords simply aren’t good enough anymore, and hackers are always finding ways to crack even the most complex passwords. This is why many businesses are looking to improve security […]

Baseball Executive Pleads Guilty to Hacking Rival

b2ap3_thumbnail_baseball_hacker_400.jpg

IT can be like baseball. When a team is up to bat in a game of baseball, the team at bat is allowed to keep two coaches on the field. They are called the first base coach and the third base coach. While both coaches’ responsibilities mostly have to do with baserunning, the third base […]

How Shadow IT Puts Your Entire Business In Jeopardy

b2ap3_thumbnail_shadow_it_400.jpg

The average small and medium-sized business has trouble with the implementation of comprehensive IT solutions, mainly due to these organizations having fewer resources to allocate towards these solutions. This often leads to end-users implementing their own solutions, which can be dangerous under the wrong circumstances. By allowing this “shadow IT” to run rampant in your […]

Tip of the Week: Spot a DDoS Attack Before it Takes Down Your Network

b2ap3_thumbnail_d_d_o_s_400.jpg

Direct denial of service attacks are a major problem for businesses. On one hand, they’re difficult to prevent entirely, incredibly annoying, and costly. Hackers are realizing just how annoying DDoS attacks can be, and are capitalizing on them in order to both make a quick buck, and to take jabs at organizations that aren’t necessarily […]

Hacking Attacks Can Have Deadly Consequences

b2ap3_thumbnail_life_threatening_hack_400.jpg

We all know that hackers are never good news. All they want to do is ruin someone’s day by planting a threat in an innocent person’s PC or steal some data from a business. However, some hackers could potentially have much more dangerous (and deadly) agendas, like sabotaging hospital equipment. We know, you don’t often […]

How a Cloud Service Without Role-Based Access Controls is Asking For Trouble

b2ap3_thumbnail_cloud_security_400.jpg

Cloud computing started out as a trend, but it’s become a staple in the modern business environment. A recent poll of IT and business executives by Harvard Business Review and Verizon shows that 84 percent of respondents have increased their use of cloud services in the past year, 39 percent of which “increased significantly.” The […]

Tip of the Week: Make Your Password Rhyme Every Time

b2ap3_thumbnail_security_for_your_passwords_400.jpg

Password security is quite the conundrum. We want our passwords to be easy to remember, but the problem is that passwords that are easy to remember are often simple and insecure. Therefore, it becomes a best practice to use complicated passwords with both upper and lower-case letters, numbers, and symbols to compensate. The “passpoem” might […]

If a Teenager Can Hack the CIA, You Can Be Hacked Too!

b2ap3_thumbnail_cia_hacked_400.jpg

With new threats emerging all of the time, it’s no wonder that cybersecurity is such a major part of any technological endeavor. Your should be using the most powerful security solutions on the market in order to avoid intensive hacks. Despite the emphasis that our society places on security, it takes a high-notoriety hack to […]