Security

Reacting to malware infections

Date: 04 Apr 2014 | Posted BY: ulisticadmin

Computers must have appropriate protection from malware attacks. Aside from creating annoyances, malware infections can also affect the performance of your computer. Furthermore, the data on your system and confidential information that you use online may also be tracked and used without your knowledge. Because of the severity of the problems that it can cause you need to be very cautious about pr

Do you audit your security?

Date: 20 Mar 2014 | Posted BY: ulisticadmin

All about Apple’s SSL bug

Date: 06 Mar 2014 | Posted BY: ulisticadmin

What is spear phishing?

Date: 20 Feb 2014 | Posted BY: ulisticadmin

One of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is spear phishing. What is spear phishing? Spear phishing is a specialized typ

Be secured with defense in depth

Date: 14 Feb 2014 | Posted BY: ulisticadmin

As information technology systems get more complex, computer malware also gets stronger and more aggressive. An effective security strategy to protect your computer system from a variety of malware is to employ the concept known as defense in depth. In its simplicity, it involves implementing multiple secured layers wrapped around your computer system. Just like the human body, a computer system

Secure your devices while away

Date: 11 Feb 2014 | Posted BY: ulisticadmin

It's 2014, and that means that it's an Olympic year. This year the Winter Olympics are being held in Sochi, Russia. As with almost every other Olympics there has been a number of organizational issues to deal with to ensure the Games run smoothly. Unlike other events however, one of this year's big issues is hacking of the computers and phones of attendees and visitors. Hacking at the Winter Olymp

What is managed antivirus?

Date: 23 Jan 2014 | Posted BY: ulisticadmin

Let's face it, technology, while essential, is getting increasingly challenging to manage. Many business owners are struggling to ensure that all of their systems are not only working properly but are also secure. One solution many turn to is the skills and support of an IT partner. These tech partners offer a wide variety of managed services, including managed antivirus solutions that help ensure

4 security threats in 2014

Date: 09 Jan 2014 | Posted BY: ulisticadmin

In the first few weeks of each new year, you often see business leaders and managers setting goals for the year to come. Most of these goals are determined based off of trends that have been identified as valuable. When it comes to security however, it is a good idea to not look at trends but potential threats. By knowing what could threaten your business in the year to come, you can better prepar

Is your password secure?

Date: 27 Dec 2013 | Posted BY: ulisticadmin

The number of accounts and websites we have to log in to is growing, and will continue to do so for the foreseeable future. One downside of this increased activity is that security breaches will also continue to rise as well. When it comes to security, often the weakest points are the passwords people use. Far too many passwords are weak and easily guessed, which puts systems and data at risk. Ma

4 password policy pitfalls

Date: 12 Dec 2013 | Posted BY: ulisticadmin

When it comes to the security of the systems and the data in your business, you likely have a good security system in place and your systems are largely secure. That being said, there is one common weak link that all businesses share - the password. If a hacker can crack a password, they will often have full access to your systems. In an effort to try and control this, many companies have password