Network

5 Vulnerabilities to your Company’s network

By | 2017-04-11T16:15:11+00:00 April 11th, 2017|Categories: Network|Tags: , |

5 Vulnerabilities to your Company’s network. Cybersecurity defenses must constantly evolve to meet new threats. To do so, IT executives must keep up with a lot. The good news is that many threats — even sophisticated ones— are preventable. Here are six common threats and the tactics IT departments are using to combat them: 1.) Unsecured [...]

Xagent, Malware for MACs

By | 2017-02-23T13:59:11+00:00 February 23rd, 2017|Categories: Cyber Security, Network, Apple Mac|

by Matt Haring The group behind one of the largest cyberespionage campaigns in history has been targeting Mac users with malware designed to steal passwords, take screenshots, and steal backed-up iPhone data. This malware, discovered by cyber security researchers, is thought to be linked to the APT28 group, which was accused of interfering in the United [...]

Yahoo Hack – What you and your users need to know

By | 2016-10-10T12:22:17+00:00 October 10th, 2016|Categories: Cyber Security, Network|

Yahoo announced that 500 million of their accounts were hacked and are sold by internet criminals. Bad guys are going to use this information in a variety of ways. For instance, they will send phishing emails claiming you need to change your Yahoo account, looking just like the real ones.   Here is what I [...]

Why is content filtering important?

By | 2016-10-27T15:52:34+00:00 August 12th, 2016|Categories: Network|Tags: , |

by:  Matthew Haring Content filtering is a program that help system administrators decide which content is acceptable for viewing and accessing. The content filters prevent people in the network from accessing certain types of material (content) on the internet. Content filters are majorly used by businesses and organization to block access non-work related websites including [...]