by bct2mastertemp | Sep 17, 2022 | Blog
Smaller companies often struggle to develop and invest in robust IT security systems, which can leave them relatively more vulnerable to cyber attacks. If that’s the situation you’re in and you’re trying to decide what to invest in and where to use...
by bct2mastertemp | Aug 31, 2022 | Blog
According to ongoing research by Group-IB, a massive phishing campaign is currently underway. This is a campaign that has impacted no less than 130 organizations across a broad range of industries. These include but are not limited to professional recruiting firms and...
by bct2mastertemp | Aug 25, 2022 | Blog
If you own a Lenovo laptop, be aware that researchers at ESET have recently discovered a trio of bugs reported to Lenovo that could allow an attacker to disable security features and hijack your operating system. The issues are tracked as CVE-2022-1890, CVE-2022-1891,...
by bct2mastertemp | Aug 22, 2022 | Blog
Security researchers at Unit 42, a division of Palo Alto Networks, have been tracking the efforts of a massive campaign aimed at Elastix VoIP telephony servers. They are used by companies of all shapes and sizes to unify their communications, and it is especially...
by bct2mastertemp | Aug 17, 2022 | Blog
Most business owners understand the importance of being active on at least one social media channel. That’s fine as far as it goes, but have you considered supplementing your social media presence with a good, old-fashioned newsletter? Of course, when we say...