866.222.3870

The Dangers Within Trusted Websites

By Redbud on Mar 9, 2018 9:52:02 AM

Websites that seem to be trustworthy are not always safe. In recent years, cyberattacks have been perpetrated through what people believe to be safe websites. According to Menlo Security’s State of the Web 2017, of the top 100,000 websites, 42% were deemed “risky” due to the following reasons: the use of vulnerable software, a history of distributing malware, and experiencing a security breach within the last year. In general, news and media sites was the category with the largest risk factor with 49%. In 2017, Business and Economy sites were hit with the most security risks incidents with 23,819.

Continue Reading

Computer Security Day

By Redbud on Nov 30, 2017 10:11:26 AM

close up of a calendar

In the United States, November 30th is Computer Security Day. The purpose of this day is to bring awareness to the risks of the internet and urge users to protect themselves and their technology. As the years have progressed the internet has become a greater and greater part of everyday life. It is uncommon to walk down a city street and not see a cellphone, tablet, or Bluetooth speaker in someone’s ear. What these people don’t think about is the risk that comes with having the latest technology. Today, it is encouraged that people take a step back and review some of the tips that can keep them and their technology safe from potential threats.

Continue Reading

What You Need to Know About Ransomware

By Redbud on Sep 29, 2017 10:28:42 AM

Closeup of businessman with handcuffed hands against red bleachers looking down on football pitch

Ransomware attacks are increasing at a terrifying rate. Recently, the ransomware attack “WannaCry” affected an alarmingly high number of individuals. In mid-May of this year, over 230,000 computers were affected spanning more than 150 countries. Individuals along with major corporations were targeted through the Windows operating system. Unless the ransom was paid, the organization would not be able to retrieve their encrypted data.

Continue Reading

3 Ways to Keep Your Employees Happy

By staff on Mar 31, 2017 6:56:57 AM

 

To foster a successful work environment, it is important to make sure your employees are happy. Turnover from unhappy employees will not only lead to stress and loss of profits, but you may even find yourself in a difficult position with successful recruitment. Employees and ex-employees talk, so in order to ensure the talk is positive take a look at the following suggestions.

Continue Reading

The Cloud and Cyber Security

By staff on Feb 28, 2017 12:28:38 PM

Cloud based technology first started gaining popularity in the early 2000s, but it has evolved exponentially since then. In fact, you are probably utilizing it even if you don’t realize it. If you use LinkedIn, Constant Contact or operate on an iOS platform, you’re using cloud technology. This technology has become more prevalent as each year passes and is now being used by businesses all over the world.

Continue Reading

How to Identify Phishing Attacks

By staff on Feb 14, 2017 12:46:20 PM

Phishing is an increasingly popular way for cybercriminals to steal a user’s personal information. Phishing is accomplished through electronic communication, usually in the form of a fake website that appears to be genuine, and can be difficult for the average person to detect. These nefarious cyber invitations will seem to be coming from a legitimate source to trick users into revealing login information or to install malware on their computers. Hackers do this by requesting sensitive details about bank information and personal identity or they include dangerous attachments in emails.

Continue Reading

Human Error and Cyber Security

By staff on Jan 31, 2017 10:55:31 AM

There are federal laws in place that ensure companies enforce a number of cyber security measures to protect themselves against cybercrimes. These laws are a great way to encourage businesses to stay up-to-date on preventative tactics. Unfortunately, these guidelines mainly address the more technical side of cyber security and don’t put enough emphasis on human errors.

Continue Reading

3 Mistakes a Company Makes after a Cyber Attack Occurs

By staff on Dec 15, 2016 5:14:41 PM

Unfortunately, the truth of the matter is companies of all sizes are victims to cyber attacks. We’ve discussed cyber security statistics, lessons learned, terms to know and prevention tactics in previous posts, and all these topics revolved around the idea of anticipating and reacting to a cyber attack. But one topic than tends to get swept under the rug are the mistakes made by companies after a cyber attack has occurred. Let’s look at three major mistakes.

Continue Reading

5 Staggering Cybercrime Statistics

By staff on Nov 30, 2016 9:19:40 AM

If you think your business doesn’t need cyber security to protect its sensitive data, check out some of the staggering cybercrime facts posted by Security Intelligence earlier this month. We’ve listed the top five we think are especially important, but all the facts can be found here.

Continue Reading

Lessons Learned from Hacked Companies

By staff on Nov 15, 2016 12:41:05 PM

Target. Sony. Ashley Madison. What do these companies have in common?

Continue Reading