Threats

Zoom Bombing

on Mar 27, 2020

Protect your next business conversation against “Zoom Bombing”. Haven’t heard of Zoom Bombing? With the social distancing and self isolation many of use are in the midst of due to the Coronavirus/Covid 19 we are turning to technology. We are using technology to keep connected visually and verbally to our network of co-workers, students, friends and...

Read More

How to Stop Ransomware

on Mar 30, 2018

Key Technologies and Security Best Practices 54% of organizations have been hit by ransomware – twice on average. So it’s critical that you have advanced protection technologies in place, combined with good user security practices to keep your organization secure. Securing Your Endpoints Stopping ransomware from gaining a foothold on your endpoint...

Read More

Petya Global Ransomware Attack

on Jun 28, 2017

As you may have seen in the news yesterday, we are currently experiencing another global ransomware attack. The last attack was the WannaCry in May. This latest ransomware has been called ‘Petya’€. We wanted to send out a brief email to bring our customers up to date, and advise what steps can be taken to defend yourself and your company against these...

Read More

Fireball Malware

on Jun 13, 2017

A new piece of malware was discovered this week and has already infected more than 250 million machines. Fireball Originating out of China, Fireball changes the default search engine and tracks web traffic. The malware also has the ability to remotely run any code on the victim’s machine, or download new malicious files. It’s potentially serious malware,...

Read More

Worming through SMB

on May 16, 2017

Wannacry’€™s, the group responsible for the malware, utilizes a propagation method which includes port scanning of potential hosts over Transmission Control Protocol (TCP) port 445, which is where the Server Message Block (SMB) network communications protocol take place. This application-layer protocol is being targeted by Wannacry specifically to help it...

Read More