Why MSPs Should Expect No-Conflict Endpoint Security
Reading Time: ~ 3 min. “Antivirus programs use techniques to stop viruses that are very “virus-like” in and of themselves, and in most cases if you try to run two antivirus programs, or full security...
View ArticleCyber News Rundown: Data Dash
Reading Time: ~ 2 min. DoorDash Data Breach Nearly five months after a breach, DoorDash has just now discovered that unauthorized access to sensitive customer information has taken place. Among the...
View Article5 Key Benchmarks for Choosing Efficient Endpoint Security
Reading Time: ~ 3 min. First and foremost, endpoint protection must be effective. Short of that, MSPs won’t succeed in protecting their clients and, more than likely, won’t remain in business for very...
View ArticleOnline Gaming Risks and Kids: What to Know and How to Protect Them
Reading Time: ~ 4 min. Online games aren’t new. Consumers have been playing them since as early as 1960. However, the market is evolving—games that used to require the computing power of dedicated...
View ArticleCyber News Rundown: E-Scooters Vulnerable
Reading Time: ~ 2 min. E-Scooter Security Vulnerability A security researcher recently found an API vulnerability within the software of Voi e-scooters that allowed him to add over $100,000 in ride...
View ArticleCookies, Pixels, and Other Ways Advertisers are Tracking You Online
Reading Time: ~ 3 min. In May of 2018, the General Data Protection Regulation (GDPR) came into effect in the EU. Seemingly overnight, websites everywhere started throwing pop-ups to inform us about...
View ArticleCyber News Rundown: Cryptomining WAV Files
Reading Time: ~ 2 min. Cryptominers Found in Audio Files Researchers have recently found that both cryptominers and backdoors are being deployed within WAV audio files on targeted systems. Using...
View ArticleSecuring Your Business First: Learn How ADR Can Help
Reading Time: ~ 3 min. Entrepreneur Jim Rohn once said, “Time is more valuable than money. You can get more money, but you cannot get more time.” I think anyone involved in running a business can...
View ArticleWhy Healthcare Organizations are Easy Targets for Cybercrime
Reading Time: ~ 3 min. Certain types of cybercrime targets always make headlines. In this two-part series, we’ll get into a pretty serious one: your health, and why hackers are targeting the healthcare...
View ArticleCyber News Rundown: MedusaLocker Ransomware
Reading Time: ~ 2 min. MedusaLocker Ransomware Spotted Worldwide While it’s still unclear how MedusaLocker is spreading, the victims have been confirmed around the world in just the last month. By...
View ArticleHealthcare Cyber Threats That Should Keep You up at Night
Reading Time: ~ 4 min. In my previous blog post, Why Healthcare Organizations are Easy Targets for Cybercrime, I discussed various reasons that hospitals and healthcare organizations make desirable and...
View ArticleThe Truth about Phishing & the Psychology of Why We Click
Reading Time: ~ 5 min. “Phishing” may have been a relatively obscure term, but pretty much everyone has heard of it by now. In fact, recent statistics indicate a high likelihood that you—or someone you...
View ArticleCyber News Rundown: Bed, Bath, & Beyond Data Breach
Reading Time: ~ 2 min. Bed, Bath, & Beyond Data Breach An official announcement made earlier this week acknowledged illicit access to customer data used in online accounts for Bed, Bath, &...
View ArticleCyber News Rundown: Nikkei BEC Scam
Reading Time: ~ 2 min. BEC Scam Takes Millions from Nikkei America Officials for Nikkei are working to identify the perpetrators of a recent business email compromise (BEC) scam that took roughly $29...
View ArticleShoring Up Your Network and Security Policies: Least Privilege Models
Reading Time: ~ 3 min. Why do so many businesses allow unfettered access to their networks? You’d be shocked by how often it happens. The truth is: your employees don’t need unrestricted access to all...
View ArticleCyber News Rundown: Orvis Password Leak
Reading Time: ~ 2 min. Orvis Internal Credentials Leaked A database containing login credentials for numerous internal systems belonging to Orvis, one of America’s oldest retailers, was found to be...
View Article5 Tips for Feeling Your Best in Your Home Office
Reading Time: ~ 4 min. With major advancements in communication technology, many employees and entrepreneurs are opting to work from home at least some of the time. In fact, according to CNBC, 70...
View ArticleCyber News Rundown: Shade Ransomware Most Distributed Variant
Reading Time: ~ 2 min. Shade Ransomware Takes Crown as Most Distributed Variant Over the course of 2019, one ransomware variant, known as Shade, has taken over 50 percent of market share for ransomware...
View ArticleSimplified Two-factor Authentication for Webroot
Reading Time: ~ 1 min. Webroot has evolved its secure login offering from a secondary security code to a full two-factor authentication (2FA) solution for both business and home users. Webroot’s 2FA...
View ArticleWhat You Need to Know about Cyberbullying
Reading Time: ~ 2 min. Have you noticed a decrease in your child’s happiness or an increase in their anxiety? Cyberbullying might be the cause to these behavioral changes. Bullying is no longer...
View Article