Date: 04 Apr 2014 | Posted BY: ulisticadmin
Computers must have appropriate protection from malware attacks. Aside from creating annoyances, malware infections can also affect the performance of your computer. Furthermore, the data on your system and confidential information that you use online may also be tracked and used without your knowledge. Because of the severity of the problems that it can cause you need to be very cautious about pr
Date: 20 Feb 2014 | Posted BY: ulisticadmin
One of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is spear phishing. What is spear phishing? Spear phishing is a specialized typ
Date: 14 Feb 2014 | Posted BY: ulisticadmin
As information technology systems get more complex, computer malware also gets stronger and more aggressive. An effective security strategy to protect your computer system from a variety of malware is to employ the concept known as defense in depth. In its simplicity, it involves implementing multiple secured layers wrapped around your computer system. Just like the human body, a computer system
Date: 11 Feb 2014 | Posted BY: ulisticadmin
It's 2014, and that means that it's an Olympic year. This year the Winter Olympics are being held in Sochi, Russia. As with almost every other Olympics there has been a number of organizational issues to deal with to ensure the Games run smoothly. Unlike other events however, one of this year's big issues is hacking of the computers and phones of attendees and visitors. Hacking at the Winter Olymp
Date: 23 Jan 2014 | Posted BY: ulisticadmin
Let's face it, technology, while essential, is getting increasingly challenging to manage. Many business owners are struggling to ensure that all of their systems are not only working properly but are also secure. One solution many turn to is the skills and support of an IT partner. These tech partners offer a wide variety of managed services, including managed antivirus solutions that help ensure
Date: 09 Jan 2014 | Posted BY: ulisticadmin
In the first few weeks of each new year, you often see business leaders and managers setting goals for the year to come. Most of these goals are determined based off of trends that have been identified as valuable. When it comes to security however, it is a good idea to not look at trends but potential threats. By knowing what could threaten your business in the year to come, you can better prepar
Date: 27 Dec 2013 | Posted BY: ulisticadmin
The number of accounts and websites we have to log in to is growing, and will continue to do so for the foreseeable future. One downside of this increased activity is that security breaches will also continue to rise as well. When it comes to security, often the weakest points are the passwords people use. Far too many passwords are weak and easily guessed, which puts systems and data at risk. Ma
Date: 12 Dec 2013 | Posted BY: ulisticadmin
When it comes to the security of the systems and the data in your business, you likely have a good security system in place and your systems are largely secure. That being said, there is one common weak link that all businesses share - the password. If a hacker can crack a password, they will often have full access to your systems. In an effort to try and control this, many companies have password