Posted on Tuesday March 21, 2017
While a vast majority of ransomware that's been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new ransomware strain, OSX/Filecoder.E, which encrypts Mac files and keeps them locked even after the victims have paid the ransom. But don't worry, there is still hope if you follow the security advice below.
Posted on Monday March 20, 2017
To those who are unfamiliar with Google Cloud Platform, it's an app-development program offered via Google's public cloud. It is Google's answer to Amazon Web Services (AWS) and Microsoft Azure. Like those two cloud platforms, Google Cloud Platform offers similar services and a similarly structured free-trial period. Recently, Google improved its own service with an ‘Always Free' tier, which enhances its free-trial offering with more cloud features. Let's take a look.
Posted on Friday March 17, 2017
Adding value to your organization is very different than it was a few decades ago. Whereas business owners previously sought more tangible boosts like equipment and staff, cloud technology has totally changed the game. Now, a single piece of software is all it takes to totally revolutionize your fulfillment and shipping process.
Posted on Thursday March 16, 2017
Internet security company Cloudflare revealed a major flaw in their system. The so-called ‘Cloudbleed' vulnerability leaked customer information from thousands of websites, according to Cloudflare researchers. Fortunately, there have been no signs of exploitation, but that doesn't mean you should be complacent. Here's everything you need to know about Cloudbleed.
Posted on Wednesday March 15, 2017
Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by promises of quick and easy solutions that can be installed and managed right from your desktop. In the software vs. hardware debate, there's a clear winner when it comes to your security. Let's take a look at what the differences are and why they matter.
Posted on Tuesday March 14, 2017
The average smartphone user doesn't give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely to get anxious about their phone's physical safety than the more serious threat of malware. Malware and other forms of cyber threats are far more common in desktops and laptops particularly for business users, but with the increasing sophistication of cyber crimes, disregarding your other ‘lower risk' devices' security can mean disaster.