Category Archives: Security – News and General

Shellshock 101: What is it?

Security_Oct07_A_PH

Earlier this year news broke of one of the most widespread and potentially devastating bugs to-date – Heartbleed. While heartbleed was massive and companies are still dealing with the fallout to this day, news has recently broke of an even bigger potential threat: Shellshock. This is a security issue all business owners, managers, and employees […]

Also posted in General Articles A | Tagged , , , , , , , | Comments closed

New security flaw leads to Shellshock

Security_Oct07_B_PH

In late spring of this year news broke of the biggest security issue to date – Heartbleed. Many companies leapt to secure themselves from this, but the fallout from it is still being felt. That being said, there is a new, even bigger, security problem called Shellshock that all businesses need to now be aware […]

Also posted in General Articles B | Tagged , , , , , , , | Comments closed

Are you suffering from Shellshock?

Security_Oct07_C_PH

When first announced in April of 2014, Heartbleed was one of the biggest security issues ever uncovered. Companies scrambled to patch systems and ensure they were protected from this problem. While big news, there is a recently uncovered security flaw called Shellshock which could make Heartbleed look relatively small in comparison, and it is a […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed

Business security: 5 Common flaws

Security_Sep29_A_PH

With the ever growing number of security threats faced by businesses around the world, the vast majority of business owners have adopted some form of security measures in an effort to keep their organizations secure. But, how do you know the measures you’ve implemented are actually keeping your systems safe? Here are five ways you […]

Also posted in General Articles A | Tagged , , , , , , , | Comments closed

5 Ways business security is flawed

Security_Sep29_B_PH

Business owners and managers are becoming increasingly worried about the security of their systems and networks. While the vast majority have implemented some form of security, this may not be enough. In fact, we have helped a number of businesses with flawed security measures in place. The issue is, how do you know if your […]

Also posted in General Articles B | Tagged , , , , , , , | Comments closed

5 Common security issues

Security_Sep29_C_PH

It’s probably safe to say that the security of your networks and systems is something you are concerned about. In truth, the majority of businesses do have security measures in place. The question you therefore need to ask yourself is if the measures you have implemented are sufficient enough. To help answer that question, here […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed

Protection from cloud and data breach

Security_Sep15_C_PH

Many businesses are turning to the cloud in an attempt to avoid data breaches, which are growing in number as well as intensity. Still, what some businesses might not be aware of is the fact that there are certain parts of the cloud that point to an increased data breach risk. However, this doesn’t have […]

Also posted in General Articles C | Tagged , , , , , , | Comments closed

Cloud and data breach prevention

Security_Sep15_B_PH

Today’s technology advancement has one obvious parallel: increasing security threats. One such issue which has been growing both in number and intensity is data breach. And while many businesses have turned to the cloud in the hope of improving security, there is still a chance of a collision between data breaches and cloud usage. But […]

Also posted in General Articles B | Tagged , , , , , , | Comments closed

Avoid cloud and data breach

Security_Sep15_A_PH

Data breaches are growing both in number and intensity. While many businesses have turned to cloud apps for better security measures, some experts and businesses worry about the cloud, mentioning that it could see an increased data breach risk. This leads to a collision course between data breaches and cloud usage. But it doesn’t have […]

Also posted in General Articles A | Tagged , , , , , , | Comments closed

How to avoid juice jacking!

Security_Sep02_C_PH

What do you do when your smartphone needs to be charged but your charger is not at hand? A handy solution is to turn to a public charging kiosk. But what you might not be aware of is the fact that this can lead to juice jacking of your smartphone. To avoid this security threat, […]

Also posted in General Articles C | Tagged , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.