Technology Advice for Small Businesses

Keep your Dropbox secure

The next time you visit Dropbox.com, you may be asked to create a new password. Why? Back in 2012 the cloud storage firm was hacked, and while it thought only email addresses had been stolen, new evidence has come to light that user passwords were compromised, too. So if you’ve been using Dropbox since that… Continue reading Keep your Dropbox secure

Change your Dropbox password

In 2012, cloud storage firm Dropbox was hacked with over two-thirds of its users’ details dumped all over the internet. While the company initially thought a collection of email addresses was the only thing stolen, it was wrong — passwords had been compromised as well. This new information came to light when the database was… Continue reading Change your Dropbox password

Reset your Dropbox password

Remember in 2012 when Dropbox’s data, which contained details of around two-thirds of its customers, were leaked? At the time, Dropbox reported that a collection of users’ email addresses had been stolen, but it wasn’t until recently that the company discovered that passwords had been stolen as well. So what does this mean for Dropbox… Continue reading Reset your Dropbox password

Don’t let hackers fool you with these tricks

According to several reports, the volume of malicious cyber attacks have increased since the beginning of the Rio Olympics. And even though our devices have the latest network security systems, hackers have a cunning trick up their sleeves — social engineering. Unlike malware and other viruses, social engineering tricks people into divulging sensitive data to… Continue reading Don’t let hackers fool you with these tricks

Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own. If used effectively, hackers can… Continue reading Beware of these social engineering tactics

4 Social engineering scams to watch out for

Every time we learn about a cyberattack that has affected so many businesses, we invest in security technologies that will safeguard our systems. This year, however, social engineering attacks have taken center stage in the Rio Olympics. Using various scams, hackers can circumvent network security systems by convincing gullible users into giving away sensitive information.… Continue reading 4 Social engineering scams to watch out for

Free decryption tools fight ransomware

Similar to the shakedowns you see in mob movies where innocent shop owners are forced to pay “protection money,” deploying ransomware is a means of extortion. Computer hackers install it on your network to seize control of your company’s precious confidential data, then demand payment for its safe return. The way in which these nefarious… Continue reading Free decryption tools fight ransomware

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many… Continue reading Two new tools for defeating ransomware

Set your ransomed files free, for free

In computers, as in war, encryption is a way of encoding sensitive information so only authorized parties can make use of it. Unfortunately, computer hackers have developed ways to infiltrate your company’s network and systems, take your confidential data hostage, and unlawfully encrypt it. Pay them a ransom and you may or may not get… Continue reading Set your ransomed files free, for free

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether. We’ve organized 5 simple cybersecurity measures that we promise anyone… Continue reading 5 security measures made easy