Security

Tips to monitor employee activities online

Date: 15 Mar 2016 | Posted BY: ulisticadmin

When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring. And if you do decide to go through with it, we’ve provided some tips for a smooth implementation process

Risks financial firms face

Date: 29 Feb 2016 | Posted BY: ulisticadmin

TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques ranging from social-engineering to credential-stealing malware. This means the time for security professionals to boost cyber situational awareness has nev

Secure your business with these IT policies

Date: 09 Feb 2016 | Posted BY: ulisticadmin

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach. So what can you do to prevent it? Well at the very least you need to include policies in your employee handbook, and ensure your employee reads through it and signs off on agreeing to abide by them. Havi

The true story of an SMB attacked by hackers

Date: 25 Jan 2016 | Posted BY: ulisticadmin

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times recently ran an article telling the story of a small business, just like you, who suffered a major cyber attack. Here’s the story, and some ideas

Chimera ransomware’s scary tactics

Date: 29 Dec 2015 | Posted BY: ulisticadmin

The threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to circumvent them. In addition, as end users become savvier to the tricks and scams used to steal our data, money or identities, new tactics are employed

2016’s possible security problems

Date: 28 Dec 2015 | Posted BY: ulisticadmin

As shown by recent high-profile hacking scandals - targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison - cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers. So what do you need to know in order to be able to keep your small or

Twitter alerts users to cyber attacks

Date: 18 Dec 2015 | Posted BY: ulisticadmin

Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to stay. And now with Twitter also recently taking steps to alert their users about possible account hacking attempts, this may well be something that

How Google overcomes secure browsing issues

Date: 17 Dec 2015 | Posted BY: ulisticadmin

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore safer online security practices you are putting your identity and the security of your company at serious risk. But what are big providers like Googl

Secure your SMB by following these rules

Date: 26 Oct 2015 | Posted BY: ulisticadmin

Sufficient security policies can make or break your small or medium sized business. But the truth is that many SMB owners are unsure as to the type of security measures needed to protect their organization. That’s why we’ve compiled this list of the minimum security precautions that every SMB owner should follow to ensure their company is safe. Recognize where your most critical data lies Is

Vulnerability exposed by WhatsApp bug

Date: 07 Oct 2015 | Posted BY: ulisticadmin

News that a potential security threat in the web-based version of WhatsApp left up to 200 million of its users with their data exposed to hackers and malware acts as a reminder to us all to be vigilant in our online interactions. While the bug affected the popular instant messaging app’s web-based version rather than the mobile app itself, and was remedied by WhatsApp after being detected by an