Tag Archives: cybersecurity

Some ransomware strains are free to decrypt

2017March22Security_A_PH

Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a singular purpose: Extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is whether your ransomware infection already has a free cure. […]

Posted in General Articles A, Security | Also tagged , , , | Comments closed

No Ransom: a place for free decryption

2017March22Security_C_PH

Although a ransomware infection might feel targeted, you’re not the only one who’s been infected. Ransomware is spreading at an alarming rate, but the further it goes, the more resources are allocated to fighting it. If your data is held hostage, always check these lists for free decryptors first. The state of ransomware in 2017 […]

Posted in General Articles C, Security | Also tagged , , , | Comments closed

Check the list of free ransomware decryptors

2017March22Security_B_PH

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Always make sure to check these lists before responding to a cyber attacker’s demands. The state of […]

Posted in General Articles B, Security | Also tagged , , , | Comments closed

How to recover from ransomware in your Mac

2017March21Apple_A_PH

While a vast majority of ransomware that’s been developed targets Windows computers, malware authors have begun to attack Mac devices. Recently, researchers discovered a new ransomware strain, OSX/Filecoder.E, which encrypts Mac files and keeps them locked even after the victims have paid the ransom. But don’t worry, there is still hope if you follow the […]

Posted in Apple, General Articles A | Also tagged , , , , , , , | Comments closed

Mac ransomware and how to defeat it

2017March21Apple_C_PH

Although most ransomware is designed to attack Windows systems, a new strain is targeting Mac computers. Discovered last month, Mac ransomware OSX/Filecoder.E was found by researchers to behave just like any cryptolocker variant. It would encrypt all data until victims paid the cybercriminals. But here’s the catch: There’s no guarantee that the Mac ransomware will […]

Posted in Apple, General Articles C | Also tagged , , , , , , , | Comments closed

Defend yourself from this new Mac ransomware

2017March21Apple_B_PH

Cybersecurity experts stumbled into a ransomware variant late last month, but this one doesn’t target Windows devices. The malware, known as OSX/Filecoder.E, encrypts Mac data like any cryptolocker strain many businesses have seen in the past. However, unlike normal ransomware that release files after the Bitcoin ransom is paid, this new strain makes no such […]

Posted in Apple, General Articles B | Also tagged , , , , , , , | Comments closed

Why your business needs a hardware firewall

2017March15Hardware_C_PH

Cybersecurity is one of the final bastions of hardware superiority. More and more IT solutions are being hosted in the cloud, and business owners are being told that software is all they need to get the job done, which is half true. When it comes to perimeter security you definitely need a hardware firewall, with […]

Posted in General Articles C, Hardware | Also tagged , , , | Comments closed

Which type of firewall is right for you?

2017March15Hardware_B_PH

Software solutions are almost always more user-friendly than hardware solutions. There’s no need to worry about cabling, firmware, and power consumption. But when it comes to firewalls, a software solution just can’t measure up to its hardware counterpart. Make sure you have all the facts before deciding which is right for you. Software firewalls Calling […]

Posted in General Articles B, Hardware | Also tagged , , , | Comments closed

Firewalls: hardware vs. software

2017March15Hardware_A_PH

Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by promises of quick and easy solutions that can be installed and managed right from your desktop. In the software vs. hardware debate, there’s a clear winner when it comes to your security. Let’s take a […]

Posted in General Articles A, Hardware | Also tagged , , , | Comments closed

Is fileless malware a threat to you?

2017March3Security_A_PH

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger. But even if you’re not, staying abreast of all the details is […]

Posted in General Articles A, Security | Also tagged , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.