Category Archives: Security – News and General

New security flaw in popular image uploader

2016May17_Security_A_PH

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a look at what your SMB […]

Also posted in General Articles A, Security - News and General | Tagged , , , , , , | Comments closed

Are your site’s images hiding an attack?

2016May17_Security_C_PH

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should be concerned about from a security standpoint. Let’s take a minute to […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , | Comments closed

Image uploader security flaw discovered

2016May17_Security_B_PH

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content. […]

Also posted in General Articles B, Security - News and General | Tagged , , , , , , | Comments closed

Understand these 4 types of hackers

2016Apr28_Security_C_PH

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand whether or not you’re a target and what data you […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , , , | Comments closed

4 different types of hackers

2016Apr28_Security_B_PH

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four […]

Also posted in General Articles B, Security - News and General | Tagged , , , , , , , , | Comments closed

Different types of hackers defined

2016Apr28_Security_A_PH

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of […]

Also posted in General Articles A, Security - News and General | Tagged , , , , , , , , | Comments closed

4 BYOD security risks you should address

2016Apr13_Security_C_PH

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD poses a […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , , | Comments closed

4 Security risks to consider with BYOD

2016Apr13_Security_B_PH

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not […]

Also posted in General Articles B, Security - News and General | Tagged , , , , , , , | Comments closed

How is BYOD a security risk?

2016Apr13_Security_A_PH

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data. If […]

Also posted in General Articles A, Security - News and General | Tagged , , , , , , , | Comments closed

7 Warning signs of malware infection

2016Mar29_Security_C_PH

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection. So how do you know if your company’s IT […]

Also posted in General Articles C, Security - News and General | Tagged , , , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.