Three new ways malware infects systems

2013Nov12_Security_CAs a business owner or manager you likely have many different things on your mind at any given time. One issue that many owners fret over is whether their networks, computers and the data stored within are secure enough.

5 tips to minimize malware

Security_Nov05_CCryptoLocker is the latest in a long line of destructive malware programs that have businesses worried. While this is one of the more destructive to come around, you can actually prevent this virus from infecting your systems. One of the best ways to do this is to educate yourself and your employees on steps you can take to reduce the chances of becoming infected.

CryptoLocker – what you need to know

Security_Oct30_CThe security of a business computers and networks is likely top of mind for many business owners. There are constant threats that you need to be aware of, with one of the more prevalent being malware. It seems like nearly every week there is some new security threat that could potentially infect your systems.

5 mobile security questions to answer

Security_Oct16_CThe number of mobile devices used for business purposes is increasing almost exponentially. Because of the higher use, hackers have started to target mobile devices, largely because they can be fairly easy to hack. If you use a mobile device for work, it is a good idea to ensure that it is secure from both external and internal threats.

5 ways to secure personal info

Security_Sep30_CIf you are a small business owner or manager you are likely the person that everyone turns to when things are going well, and not so well. One problem you may face is a security breach, where private information is stolen or leaked. If this were to happen, you will likely be asked questions and maybe even held accountable.

What is managed email security?

Security_Sep16_CThere are many benefits to email. So many in fact, that it has become one of the most essential forms of business communication. While it is certainly valuable, there can be issues regarding security of some systems. For most companies, security is essential and one way to achieve this is by working with a managed email security provider.

Do you ever turn your computer off?

Security_Sep02_CAsk yourself this quick question: At the end of the day, do you turn your computer off or simply stand up and leave? If you were to ask this question to 10 people, you would likely not get all of them to agree on which is the best method. This is actually a common question, but one which is not as simple to answer as you might think.

4 steps to cloud file security

Security_Aug19_CAs we enter the era of cloud computing, it’s a sure thing that many users will be unsure of the security of the system they are using and the documents and files stored within. Truthfully, these systems are fairly secure but not 100% as there is still a chance of information being stolen.

USB device poses security threat

Security_Aug05_CWhile computer systems have undoubtedly changed the way we do business, there are downsides to this, with one of the biggest being security. It’s challenging to keep your systems completely secure, especially since new threats are uncovered on a near daily basis.

5 safety steps to online shopping

Security_July22_CHave you ever bought something online? There is something compelling about browsing an online store, filling a virtual cart, checking-out and having it arrive on your doorstep a few days later. E-commerce is quickly becoming one of the most popular forms of shopping, but like everything else on the Internet, there are security issues you could run into.