logo
October 13, 2020 | Jeff Melnick

How to Detect Ransomware

The second most common type of malware incident is the notorious ransomware attack. According to the Verizon 2020 Data Breach Investigations report, the primary aim of a ransomware attack is “to disrupt operations badly enough and long enough that the organization will pay the ransom.” The...
October 20, 2020 | Ryan Brooks

How to Prevent Malware Attacks: 10 Security Tips

According to Verizon’s 2019 Data Breach Report, 28% of data breaches involve malware. This dangerous software threatens every organization and is becoming more common every day. Companies must work hard to prevent malware infections in order to: Protect sensitive information and critical...
September 1, 2020 | Jeff Melnick

Learn How to Perform Windows Registry Repair and Fix Errors, and See the Best Free Registry Cleaners

The Windows registry is a database containing important, machine-specific settings and information regarding almost everything in your computer — preferences, applications, users, attached devices and so on. The registry contains two basic elements: keys and values. The Windows operating system...
September 1, 2020 | Ryan Brooks

Securing Your Servers with Windows Defender, AppLocker, SCT and More

Malware — computer viruses, worms, Trojan horses, ransomware, spyware and so one — is a continuous threat to organizations because it can damage devices and enable unauthorized parties to access the network remotely to collect and transmit sensitive information. Windows Server 2016 includes the...
October 19, 2020 | Larry Glusman

Security Practices: 3 Good Reasons to Gap Your Backup

Everyone knows how important it is to back up their data, right? Sadly, I feel like I should laugh after saying that because I know many people that don’t understand this basic concept. If you are reading this though, you are likely in the IT field, so should know that old saying: If you aren’t...
May 22, 2019 | Ryan Brooks

3 Pokémon GO Security Risks

Are your employees or colleagues caught up in the Pokémon GO craze? Surely, most of them are. However, in the hunt to “catch ‘em all,” Pokémon GO users expose themselves to a variety of security risks. Moreover, playing the game presents major security risks for corporate information. In...
March 27, 2019 | Alex Vovk

Cryptolocker: When Antivirus Cannot Help

There is currently much talk about Cryptolocker and other kinds of ransomware. Cryptolocker is such kind of malicious program that, once it is active, starts encrypting files it can access on a local system or on network shares and then threatens to hold your data hostage until you pay. Users...
May 20, 2019 | Russell Smith

4 Ways to Avoid Malware Like Lenovo Superfish

PCs sold by Lenovo between September 2014 and January 2015 came pre-installed with Superfish VisualDiscovery, a piece of malware claiming to improve users’ Internet experience by adding visual results to Google search and other websites. But in reality, the main purpose of the software was to add...
February 25, 2019 | Richard Muniz

Another Vector for Malware Spread

Those who study epidemics, talk about the spread of disease through what they call “vectors”. Some are spread through food, water, human contact, and so on. In the computer world, viruses and malware spread through vectors. Most are rather familiar, like viruses from downloading things you...
March 27, 2019 | John O'Neill Sr.

Stopping Skeleton Key Malware from Causing Data Breaches

Proving the old adage that “criminals never sleep,” a new piece of malware is making headlines. The aptly named Skeleton Key malware, detected in mid-January, bypasses the password authentication protection of Active Directory. Just as skeleton keys from the last century unlocked any door in a...
Show more articles
...