What You Should Know About the VPNFilter Router Malware

What You Should Know About the VPNFilter Router Malware

According to a recent advisory published by the Federal Bureau of Investigation, small business owners in the High Desert should reboot their routers to minimize their exposure to a new cyber threat. What Businesses Are at Risk for Unsecure Data? The routers affected by VPNFilter include those manufactured by popular brands such as NETGEAR and…

Details

Malware is a Persistent Threat in the Cloud

Malware is a Persistent Threat in the Cloud

A report about the state of enterprise computing presented during the recent RSA Conference on digital security revealed a sobering statistic: a quarter of all American businesses using public cloud solutions have suffered data breaches. According to McAfee, a respected name in network security, data theft has affected one out of every four companies that…

Details

Evaluating Cloud Computing Solutions for Your Business

Evaluating Cloud Computing Solutions for Your Business

Cloud computing has reached a high level of maturity that allows business owners to choose between various strategies. The idea should always be to build a data infrastructure that can deliver the best possible service for customers while giving employees the best tools to carry out their duties. To determine the best cloud computing strategy…

Details

New Wave of Ransomware Attacks Expected

New Wave of Ransomware Attacks Expected

In the world of information security and cybercrime, hackers are known to chase certain trends. In the mid-1990s, cyber vandalism and defacing websites were actions that hackers engaged in for the purpose of making a name for themselves in the underground. Cracking commercial software and distributing pirated copies gained popularity in the early part of…

Details

Why Business Data Privacy is More Important Than Ever

Why Business Data Privacy is More Important Than Ever

Just as information security professionals around the world prepared for conferences and other activities to observe Data Privacy Day on January 28, a report from the European Union with regard to the General Data Protection Regulation indicated that only 29 percent of new companies are properly encrypting the data they collect from their customers. Likewise,…

Details

2018 Will Be The Year of Malware

2018 Will Be The “Year of Malware”

Providing forecasts of the challenges that lie ahead in the information security landscape has become a New Year’s tradition for experts who work in this field. Over the last few years, Israel has become known as a leading nation in terms of cybersecurity research, and one of the most worrisome forecasts was recently issued by…

Details

How Hackers Can Take Down 40 Websites in Minutes

How Hackers Can Take Down 40 Websites in Minutes

Here’s a situation that underscores the importance of network security these days: a novice hacker working for the research and development department of a Japanese automaker was able to exploit a cross-site scripting vulnerability to infiltrate a server and compromise 40 websites in seven minutes. Method of Attack Used in the Hack The attack started…

Details

Locking Down Sensitive Data in Business Laptops

Locking Down Sensitive Data in Business Laptops

What constitutes sensitive data these days? Due to the increased threat of data breaches, identity theft, and cyber attacks, the definition of sensitive data has been expanded to include just about any type of digital information that is routinely stored in a business laptop. Protecting Private Information on Business Networks From personally identifying information to…

Details

Checking the Integrity of Your Data Backups With SonicSafe

Checking the Integrity of Your Data Backups With SonicSafe

If you have been doing business for some time in the High Desert, you have probably noticed that your data storage needs and overall records retention capacity have increased exponentially over the last few years. What this also means for your company is that the data backup process should have been upgraded accordingly. Data Security…

Details