Category Archives: Security – News and General

Don’t let hackers fool you with these tricks

2016August18_Security_C_PH

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves — social engineering. Unlike malware and other viruses, social engineering tricks people into divulging sensitive data to […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , , | Comments closed

Beware of these social engineering tactics

2016August18_Security_B_PH

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can […]

Also posted in General Articles B, Security - News and General | Tagged , , , , , , , | Comments closed

4 Social engineering scams to watch out for

2016August18_Security_A_PH

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information. […]

Also posted in General Articles A, Security - News and General | Tagged , , , , , , , | Comments closed

Free decryption tools fight ransomware

2016August1_Security_C_PH

Similar to the shakedowns you see in mob movies where innocent shop owners are forced to pay “protection money,” deploying ransomware is a means of extortion. Computer hackers install it on your network to seize control of your company’s precious confidential data, then demand payment for its safe return. The way in which these nefarious […]

Also posted in General Articles C, Security - News and General | Tagged , , , , | Comments closed

Two new tools for defeating ransomware

2016August1_Security_B_PH

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]

Also posted in General Articles B, Security - News and General | Tagged , , , , | Comments closed

Set your ransomed files free, for free

2016August1_Security_A_PH

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have developed ways to infiltrate your company’s network and systems, take your confidential data hostage, and unlawfully encrypt it. Pay them a ransom and you may or may not get […]

Also posted in General Articles A, Security - News and General | Tagged , , , , | Comments closed

5 security measures made easy

2016July14_Security_C_PH

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , | Comments closed

5 tips to help deal with security headaches

2016July14_Security_B_PH

Keeping your company data safe and secured is not an easy job, especially as cyberattack threats get more and more sophisticated every day. But fret not, there are a lot of simple solutions that can be achieved with almost any level of tech expertise. In this article, we’ve listed 5 of our favorite cybersecurity tips […]

Also posted in General Articles B, Security - News and General | Tagged , , , , , | Comments closed

5 simple but manageable security measures

2016July14_Security_A_PH

Don’t be put off by the tech jargon of security experts you find in forums and self-help books. A managed service provider is what you need to break down complex security ideas into easy-to-understand language. However, they generally focus on installing and managing protection software that’s often far too complicated to operate without their help. […]

Also posted in General Articles A, Security - News and General | Tagged , , , , , | Comments closed

WordPress 4.5.3 patches security vulnerabilities

Security_2016_July_5_C_ph

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable platform out there. Recently WordPress has released an update that addresses security […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.