To Pay or Not to Pay – That is the Ransomware Question

RansomwareImagine you’ve just come home after a long day of work to open your computer and find a pop up on your screen instructing you to pay approximately $500 to unlock and decrypt all your files. You’ve just been hit by ransomware, and now you have a choice to make. Do you pay up to get your files back, or do you stand your ground? Ransomware has recently become the hottest attack method for hackers to use, and it effects upwards of 10,000 people in the US each day.

Read more…

The Importance of Backing up your Files

Cloud Storage BackupBacking up has become more important than ever, thanks to ransomware. If you are a regular reader, you already know how pervasive and frustrating ransomware can be. If you’re new to the scene, here’s a bit of background into the malware world: Ransomware is the hottest new attack method.

 

Read more…

Don’t Take the Bait when Something Smells Phishy!

Anti-Phishing ProtectionImagine the damage someone could do if they knew your Facebook password. Now imagine how much more harmful it could be if they had your banking information. Of course, you would never give over this information to a stranger, but what if they sent you an email pretending they were your bank. How would you know not to trust them then?

Read more…

Back To School – Cyber Tips

back to school security tipsThe lazy days of summer are drawing to a close. And it’s time to start thinking about back to school stuff.
Back in the day, shopping for back to school supplies meant buying and wrapping mountains of text books and sharpening lots of shiny number 2 pencils. Nowadays, back to school buying almost always involves a new tech supplies, from iPads to smartphones and laptops.

Here is a handy back-to-school cyber security do’s and don’ts checklist.

Read more…

The QuadRooter Vulnerability – AN UPDATE & WHAT TO DO NEXT ?

quadrooterThe QuadRooter set of vulnerabilities reached the headlines mainly due to its wide extent and severity. Since Check Point announced its discovery, we have received numerous questions from users around the globe asking – How can they protect themselves from malware trying to take advantage of the Quadrooter vulnerabilities?

Read more…