Category Archives: Security – News and General

What to learn from Sony’s security breach

Security_Jan12_C_PH

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they […]

Also posted in General Articles C | Tagged , , , , , , , , | Comments closed

3 IT security take-aways from the Sony hack

Security_Jan12_B_PH

Any business can become the victim of security breaches on a mass scale, as shown by the debacle which recently eclipsed Sony and forced it to temporarily cancel the release of blockbuster movie The Interview. Beneath the dramatic headlines are lessons for small business owners everywhere in how simple errors in IT security management can […]

Also posted in General Articles B | Tagged , , , , , , , , | Comments closed

What do Sony’s troubles say about security?

Security_Jan12_A_PH

Sony has learned the hard way what havoc can be wreaked when a lapse of basic security principles is allowed to go unchecked. On the receiving end of the recent hack which saw the company lose its vital email communication systems for days – reverting to pen, paper and fax machines – and with the […]

Also posted in General Articles A | Tagged , , , , , , , , | Comments closed

Spear phishing attack uncovered

security_Dec24_A_PH

There are so many ways that hackers can gain access to your computers and systems it boggles the mind. One of the more popular tactics employed is the increasingly common spear phishing. In early December 2014, news broke of a new, super savvy, spear phishing campaign that had succeeded in scamming top Wall Street companies […]

Also posted in General Articles A | Tagged , , , , , , | Comments closed

Looking at a new spear phishing attack

security_Dec24_B_PH

Take some time and research how companies are hacked and you will quickly come to realize that there are a wide variety of methods at a hacker’s disposal. One of the increasingly common, and effective, strategies being employed is spear phishing. In early December 2014, a new spear phishing attack was uncovered, one that has […]

Also posted in General Articles B | Tagged , , , , , , | Comments closed

New spear phishing attack identified

security_Dec24_C_PH

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered. This threat, while directed at larger organizations, could […]

Also posted in General Articles C | Tagged , , , , , , | Comments closed

Regin – is it really a big threat?

Security_Dec01_C_PH

Malware is a constant threat to a business’s security. However, with many malware infections we tend to be able to learn a lot about them in a very short amount of time, which weakens the power of each attack. There is a new threat called Regin however, that is leaving many security experts baffled. Here […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed

Is Regin a real threat to your company?

Security_Dec01_B_PH

While there are many different types of malware out there, the good news is that with many threats we know where they come from and their purpose. Recently, news broke of a new form of malware called Regin that is causing quite a stir in the security community, largely because it’s tough to deal with and […]

Also posted in General Articles B | Tagged , , , , , , , , | Comments closed

Regin – how bad is it?

Security_Dec01_A_PH

Spend even a small amount of time looking at the various massive malware threats out there and you will find that security experts are usually able to figure out who developed them, the intended targets, and where malware is most prevalent. In early November, news broke about a mystery security threat called Regin that has been […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

Looking at Net Neutrality

Security_Nov17_A_PH

In many western countries we are blessed with a free and open Internet, but in the US there is a battle currently raging over the idea of Net Neutrality. Chances are high that you will have heard this term thrown around by various experts and media outlets. In November, President Obama took a stance on […]

Also posted in General Articles A | Tagged , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.