Although it is not a new threat, modular malware is quickly increasing in frequency. Since the start of 2019, Barracuda Labs have identified more than 150,000 unique malicious files. Modular malware is malware with an even more dangerous twist. The robust and evasive attacks are launched in stages, adapting its tactics by analyzing the target’s environment and defenses.... Read more
The April 15 filing deadline is looming, and so far, the 2019 tax season has been a lively one. Businesses and individual filers alike have been struggling to understand the full ramifications of the significant changes made to the tax code in 2018 under the Tax Cuts and Jobs Act of 2017. Additionally, a government shutdown threw a monkey wrench into the IRS’ ability to process tax returns and issue refunds.... Read more
Email systems are the number one target of cybercriminals, and the situation is only getting worse. Attackers are finding new ways to infiltrate email accounts and use them as a platform for launching other types of attacks.... Read more
More and more, hackers are targeting managed services providers (MSPs). This is because MSPs can be a weak link when it comes to security if they aren't implementing the same security practices they encourage for their clients.... Read more
The Anti-Phishing Working Group reports that phishing attacks continue to increase every quarter, showing up most frequently in the payment, financial, and webmail sectors. Attackers are also increasingly targeting Software-as-a-Service (SaaS) applications and webmail providers. As a result, anti-phishing solution providers have reported activation rate increases over the past year that range from double-digit to quadruple-digit growth.... Read more
Over the past year, cybersecurity has hit the headlines regularly, from the alleged Russian hack of the U.S. presidential election to corporate and Department of Defense security breaches. Equifax is just the latest story, and, with 145.5 million people affected, the one that resonates most with the person on the street.... Read more
Should you build, lease or outsource your data center?
Five years ago, the prevailing wisdom was that, given a choice between building a new data center and using a hosted service, the former option was the smarter move. Even Gartner favored this approach, stating that the cost of renting rack space in a hosted data center was doubling every two years.... Read more
One of the most common ways cybercriminals dump malware payloads onto your customers’ networks is via phishing attacks sent through email. Are you doing everything you can to stop this threat?
Whether cyber criminals are seeking passwords, credit cards, or other sensitive information, the fastest and easiest way for them to get past security defenses is by recruiting your customers’ employees to do some of the legwork. More than 90 percent of these types of attacks, called phishing attacks, come in the form of email. It could appear to be an email from a bank, for example, warning the recipient about the need to update their information. Or, it could be a message from a carrier company informing the recipient about an unclaimed package.... Read more
Smart business owners know they need a disaster recovery plan. Some will even proactively approach their IT service provider about creating one to help protect their business. After all, you never know when a disaster could strike, whether it’s a fire, a flood or equipment failure, and that leaves critical information vulnerable to data loss.... Read more