Security Software Extension For XP Won’t Protect Your Business
Security Software Extension For XP Won’t Protect Your Business
Microsoft will continue to update security software for its 12-year old Windows XP operating system until July 14th, 2015. Previously, they were planning to end support by April 8th, 2014.  But they decided to extend the deadline because so many organizations were behind on the migration process. The extended support applies to the following: System […]
Read more
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware
The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target stores over the 2013 holiday shopping season.  Now Michael’s Craft Store, the largest arts and crafts dealer in the U.S. suspects it has […]
Read more
Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis
Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis
Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning is necessary to minimize these risks and protect your valuable data. In today’s technology-driven world, most businesses rely on IT to perform critical operational functions. Essentially, information technology is embedded […]
Read more
How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?
How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?
Cybercriminals are always looking for weak points in a network system to hack the security system of your business and get confidential information. Some hackers do it for the pleasure of wreaking havoc on security systems, while others do it for financial reasons; regardless of the reason, malicious attacks are an awful experience for businesses. […]
Read more
Useful iPad Apps For Your Law Practice
Useful iPad Apps For Your Law Practice
If you’re like other attorneys today, you use your iPad during trials, depositions and when on the go. In fact, an iPad can be an extremely useful tool as long as proper security measures are in place to ensure sensitive data remains protected. There are thousands of apps available to increase your productivity wherever you […]
Read more
Law Firms and The BYOD Trend: How to Manage Potential Security Risks
Law Firms and The BYOD Trend: How to Manage Potential Security Risks
Law firms are rapidly adopting the “bring your own device” trend to improve productivity and efficiencies. But there’s a problem — Using BYOD can impact your law firm’s security.  This can be addressed by creating BYOD policies. It’s critical to define your employee rights and appropriate use of mobile devices in order to protect your […]
Read more
Retailers Beware: BlackPOS Continues To Attack Merchants In The U.S.
Retailers Beware: BlackPOS Continues To Attack Merchants In The U.S.
It hasn’t been that long since the Target Corp. and Neiman Marcus security breaches, and now cybersecurity firm IntelCrawler has discovered at least six ongoing attacks at other U.S. merchants. Retailers in California and New York were among those compromised by the latest attacks. They haven’t revealed how many individuals were affected. It appears the […]
Read more
New Year, New Security Measures
New Year, New Security Measures
Protect Your Business From McAfee’s Predicted Security Threats. If you’re wondering what security threats to look out for in the New Year, McAfee released its security predictions for 2014. The report states that: Mobile devices will be a the biggest target for attackers, Ransomware is quickly becoming more sophisticated, and Social sites are being leveraged […]
Read more
White Hat vs. Black Hat Hackers and The Need For Ethical Hacking
White Hat vs. Black Hat Hackers and The Need For Ethical Hacking
What comes to mind when you hear the term “hacker?” For most people, the term is associated with cyber criminals. But did you know there is such a thing as ethical hacking? Some hackers are criminals and use their computer skills to harm or damage computer systems. These people are called black hat hackers.  White […]
Read more