Security

Added security to protect FaceTime and iMessage

Date: 18 Feb 2015 | Posted BY: ulisticadmin

Whatever services and systems we use to share, store or transfer personal and business information online, we want the reassurance that our data is safe and that everything possible is done to prevent it from falling into the wrong hands. But we also know that security breaches happen, as they did with the large-scale celebrity photo leaks in 2014. Since then, Apple platforms in particular have b

How to protect yourself against Poweliks

Date: 29 Jan 2015 | Posted BY: ulisticadmin

Think your security is taken care of with a frequent anti-virus scan? Think again. While we’ve all become used to the idea that viruses, worms and other malware - however much disruption and damage they cause to our systems - can be detected and removed thanks to the tracks they leave as they create havoc, that’s no longer something to count on. Proving the point is Poweliks, an invisible troj

What to learn from Sony’s security breach

Date: 14 Jan 2015 | Posted BY: ulisticadmin

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations. These three tips

New spear phishing attack identified

Date: 31 Dec 2014 | Posted BY: ulisticadmin

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered. This threat, while directed at larger organizations, could be turned against smaller businesses as well, and is ther

Regin – is it really a big threat?

Date: 03 Dec 2014 | Posted BY: ulisticadmin

Define: Net Neutrality

Date: 21 Nov 2014 | Posted BY: ulisticadmin

Net Neutrality is one of the biggest tech-related issues currently making its way through the American Government. In mid-November President Obama made his stance on the issue known, while also introducing a plan for it and thereby bringing the subject to worldwide attention. Here is an overview of what Net Neutrality is and how it can affect you. What is Net Neutrality? In order to define Net Neu

CryptoWall – the next security threat

Date: 13 Nov 2014 | Posted BY: ulisticadmin

Last year saw a number of highly publicized security threats that many companies struggled to deal with. One of those was some nasty malware called Cryptolocker, which held your files for ransom. While this has now largely been dealt with, news is surfacing of a second version - called CryptoWall - that has begun to infect users. What is Crypto malware? Crypto malware is a type of trojan horse t

5 Online security tips

Date: 31 Oct 2014 | Posted BY: ulisticadmin

Any business with Internet-based systems should be taking the appropriate steps to ensure that their activities and information are secure from the ever-expanding number of online threats. This can be tough, especially for businesses who operate almost exclusively online. To help, here are five tips that can help keep your online activities safe from attacks. 1. Use two-factor authentication when

Are you suffering from Shellshock?

Date: 09 Oct 2014 | Posted BY: ulisticadmin

When first announced in April of 2014, Heartbleed was one of the biggest security issues ever uncovered. Companies scrambled to patch systems and ensure they were protected from this problem. While big news, there is a recently uncovered security flaw called Shellshock which could make Heartbleed look relatively small in comparison, and it is a potential problem you should be aware of. What exact

5 Common security issues

Date: 02 Oct 2014 | Posted BY: ulisticadmin

It's probably safe to say that the security of your networks and systems is something you are concerned about. In truth, the majority of businesses do have security measures in place. The question you therefore need to ask yourself is if the measures you have implemented are sufficient enough. To help answer that question, here are five common security flaws business owners should be aware of. 1.