A disaster plan is essential for businesses in the South. A hurricane preparedness plan is just as essential for digital and electronic assets. In this blog post, we answer common questions about creating a digital disaster recovery plan. These include: … Read the rest
Microsoft’s default blocking of macros in its Office suite is not stopping hackers. These hackers are now using alternative files to host malicious payloads, now that Microsoft’s primary method of threat delivery is being cut off.
The use of macros-enabled … Read the rest
Sophos surveyed more than 300 retailers in 2021, and it found that 300 of them had been hit with ransomware attacks.
A new study from Sophos found that retail businesses are increasingly being targeted by ransomware. Sophos, a leader in … Read the rest
In this tutorial you will learn how to configure your ATT Fiber BGW320 to allow UniFi UDM PRO VPN connections through the ATT Fiber WAN IP Address.
- Log into your ATT Fiber BGW320.
- ATT Fiber BGW32 Configuration.
USB Rubber Ducky is a USB device that looks like a flash drive. It can be used to hack into systems, steal data and inject malicious codes into computers. The most important thing to remember about this device is that … Read the rest
Cybersecurity, information security, and all those acronyms… How do you keep on top of it all? Don’t forget your users. An important part of information security is user training. These days, everyone is a potential target. It’s not just the … Read the rest
Microsoft is the most popular brand for phishing attacks in the first half of 2022. It was reported that Microsoft is followed by Facebook and then Credit Agricole. WhatsApp, Orange, and other brands round out the top five.
Microsoft continues… Read the rest
Ransomware is a growing problem for mobile users. It has already been causing financial and data losses for many years, but it has now made its way to the Android platform. The new growing threat to Android Devices users is … Read the rest
Web-based applications give us the ability to shop, email, bank, learn, and socialize. These applications can be used for shopping, communicating, and so much more. They’re a great way for businesses and consumers to connect.
With the rise in popularity … Read the rest
The new ransomware is called RedAlert because of a string found in the ransom note. However, in their internal notes the developers of the Linux version are calling it N13V. It targets VMware servers and shuts down running virtual machines … Read the rest