Tag Archives: hackers

The true story of an SMB attacked by hackers

2016Jan20_Security_C_PH

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times recently ran an article telling the story of a […]

Posted in General Articles C, Security - News and General | Also tagged , , , , , , , | Comments closed

Security tips for the small business

2016Jan20_Security_A_PH

It’s been said so many times that many small business owners are likely to block it out, but the truth remains: cyber criminals target SMBs. Perhaps the reason for this ignorance is that when an SMB falls victim to an online attack, it’s not breaking news. But this time, in a recent NY Times article, […]

Posted in General Articles A, Security - News and General | Also tagged , , , , , , , | Comments closed

This small business was hacked. Are you next?

2016Jan20_Security_ B_PH

When it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may […]

Posted in General Articles B, Security - News and General | Also tagged , , , , , , , | Comments closed

WhatsApp bug exposes users to hackers

Security_Oct2_A_PH

Vulnerabilities in the web-based version of popular instant messaging app WhatsApp recently left up to 200 million users exposed to hackers and malware. The bug was picked up by an Israeli IT security firm, and WhatsApp put a fix in place before news of the potential threat spread. Nevertheless, it highlights the need to remain […]

Posted in General Articles A, Security - News and General | Also tagged , , , , , , , | Comments closed

Vulnerability exposed by WhatsApp bug

Security_Oct2_C_PH

News that a potential security threat in the web-based version of WhatsApp left up to 200 million of its users with their data exposed to hackers and malware acts as a reminder to us all to be vigilant in our online interactions. While the bug affected the popular instant messaging app’s web-based version rather than […]

Posted in General Articles C, Security - News and General | Also tagged , , , , , , | Comments closed

Bug in WhatsApp leaves users exposed

Security_Oct2_B_PH

Popular mobile instant messaging app WhatsApp was at the center of a recent security breach which saw the information of as many as 200 million users potentially exposed to the mercy of hackers and malware. The threat, which affected the recently launched web-based version of WhatsApp, was detected by an IT security firm in Israel […]

Posted in General Articles B, Security - News and General | Also tagged , , , , , , , | Comments closed

The truth about healthcare security

900_Gcare_A

While many small businesses mistakenly think they’re immune to data breaches because of their size, and therefore put minimum protection in place, healthcare organizations can’t ever risk taking this laissez-faire approach – and they’d be in trouble if they did. After all, there are rules and regulations when it comes to healthcare IT systems, and […]

Posted in General Articles A, General Healthcare IT | Also tagged , , , , , , , , | Comments closed

Hackers target healthcare data

HealthcareIT_Mar16_A_ph

Medical institutions rely on their healthcare systems to facilitate the needs of their patients, whether through electronic medical records, prescription management or data entry software. Unfortunately, most healthcare service providers don’t realize how vulnerable their IT systems are to cyber attacks. One of the contributing factors to data breach is digitization. While there are several […]

Posted in General Articles A, General Healthcare IT | Also tagged , , , , | Comments closed

Do you know who has system admin access?

One common feature found across all operating systems is the ability to have different user accounts on the same computer. These users can be assigned different statuses and some can download programs while others cannot. Most of these systems have an administrator account which gives unrestricted access to the computer. It makes sense that companies […]

Posted in General Articles A, Security - News and General | Also tagged , , , , , , | Comments closed

Admin access to systems could be trouble

Security of technical systems and devices used in the office environment is an issue that is important to many companies. Businesses often go to great lengths to ensure that their systems are secure from external threats, yet often fail to take into account inner threats. One of the most common inner security threats is that […]

Posted in General Articles B, Security - News and General | Also tagged , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.