Tag Archives: cybersecurity

Windows XP receives security update

Support for Windows XP ended in April 8, 2014. This means that Microsoft has stopped providing updates, security patches, and technical assistance for XP users for over three years. But despite the end of support date, Microsoft has recently released a new security fix for the outdated operating system. Here’s why. More WannaCry copycats The […]

Posted in General Articles C, Windows | Also tagged , , , , , , , , , | Comments closed

Microsoft issues security patch for XP

When a Microsoft product reaches its “end-of-life,” the tech developer no longer provides feature updates, technical assistance, and automatic fixes for that product. Support for Windows XP, for instance, ended in April 2014. That said, recent malware attacks have caused Microsoft to continue support for their outdated operating system. Read on to find out more. […]

Posted in General Articles B, Windows | Also tagged , , , , , , , , , | Comments closed

Why is Windows XP getting updates?

Microsoft products usually have an end-of-support date, where no more feature updates and security patches will be offered. However, earlier this month, Microsoft has released a security update for Windows XP, an operating system that has been unsupported since 2014. Although releasing a patch for an old system seems unusual, Microsoft does have its reasons. […]

Posted in General Articles A, Windows | Also tagged , , , , , , , , , | Comments closed

NSA-approved: mobile virtualization

Server and desktop virtualization have been improving computing efficiency and data security for years. But with all the talk about mobile BYOD policies and corporate data protection on smartphones, the National Security Agency (NSA) believes virtualization is the key to true security. Here’s what you need to know: US government approved The NSA maintains a […]

Posted in General Articles A, Virtualization | Also tagged , , , | Comments closed

NSA endorses mobile virtualization

Mobile device management is a full-fledged subset of IT security. Employees store and view sensitive data on their smartphones, which exposes your organization to a significant amount of risk. Although there are plenty of great solutions for managing this, the National Security Agency (NSA) believes mobile virtualization is the next big thing. US government approved […]

Posted in General Articles C, Virtualization | Also tagged , , , | Comments closed

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization. US government approved The NSA maintains […]

Posted in General Articles B, Virtualization | Also tagged , , , | Comments closed

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review […]

Posted in General Articles A, Security | Also tagged , , , , , , , | Comments closed

Lessons learned from the WannaCry malware

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here. Ransomware review Ransomware is a specific type of malware […]

Posted in General Articles C, Security | Also tagged , , , , , , , | Comments closed

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different. Ransomware review Ransomware […]

Posted in General Articles B, Security | Also tagged , , , , , , , | Comments closed

Web browser cybersecurity, ranked

Cybersecurity didn’t become more important in light of the WannaCry ransomware epidemic, it just became more visible to the average internet user. If like so many others, you’re auditing the security of business’s software, web browsers are a great place to start. Learn more about how your browser choice stacks up in your security comparison. […]

Posted in General Articles A, Web & Cloud | Also tagged , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.