Category Archives: Security

Some ransomware strains are free to decrypt

2017March22Security_A_PH

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure. […]

Also posted in General Articles A | Tagged , , , , | Comments closed

No Ransom: a place for free decryption

2017March22Security_C_PH

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the further it goes, the more resources are allocated to fighting it. If your data is held hostage, always check these lists for free decryptors first. The state of ransomware in 2017 […]

Also posted in General Articles C | Tagged , , , , | Comments closed

Check the list of free ransomware decryptors

2017March22Security_B_PH

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands. The state of […]

Also posted in General Articles B | Tagged , , , , | Comments closed

Is fileless malware a threat to you?

2017March3Security_A_PH

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

Fileless malware: who are the targets?

2017March3Security_C_PH

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, […]

Also posted in General Articles C | Tagged , , , , , | Comments closed

Fileless malware is back, are you at risk?

2017March3Security_B_PH

How many times have you read a shocking headline, only to find the attached article incredibly underwhelming? Over the last several weeks headlines decrying the threat of “fileless malware” have been everywhere, but the truth is a little less scary. Let’s take a look at what’s really going on and who’s actually at risk. What […]

Also posted in General Articles B | Tagged , , , , , | Comments closed

What exactly is preventive cyber-security?

2017February15_Security_A

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

Also posted in General Articles A | Tagged , , , , , | Comments closed

5 great ways to prevent cyber-attacks

2017February15_Security_C

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if […]

Also posted in General Articles C | Tagged , , , , , | Comments closed

How can you go from reactive to preventive IT?

2017February15_Security_B

Shopping around for a managed IT services provider is tough. You’re looking for a business to manage extremely complex and delicate technology, so they can’t be expected to get into the nitty gritty details of DNS-layer security, intrusion prevention systems, and encryption in their marketing content. But one thing does need clarification: What exactly are […]

Also posted in General Articles B | Tagged , , , , , | Comments closed

Hackers use browsers to get credit card info

2017January27_Security_C_PH

Does filling in web forms sap all your browsing energy? Do you find it especially taxing to shop or register online using a mobile device? Google’s Chrome alleviated this dilemma when it introduced the Autofill feature in 2011, which made filling in forms much faster and making credit card purchases online more convenient. Unfortunately, it […]

Also posted in General Articles C | Tagged , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.