TechAdvisory.org

Technology Advice for Small Businesses

What to do if malware is detected

Malicious software (more commonly known as malware) can be found on almost any system, most often being downloaded and installed on computers. It can cause a myriad of annoyances, like unwanted pop-ups and system freezing, and some forms can even gain unauthorized access to your PC, stealing personal information. It’s therefore essential that malware is… Continue reading What to do if malware is detected

Do you audit your security?

Any business that employs technology in any aspect will eventually begin to worry about how secure their systems are. In order to ensure security, many companies implement a security strategy. While these strategies are a great way to ensure the security of your business systems and data, there is one element that many business owners… Continue reading Do you audit your security?

Security strategy – do you audit it?

Security of a business’s systems and networks should be important to many business owners and managers. In fact, an increasing number of companies are implementing security strategies. While these strategies do keep businesses secure, there is one critical element that could cause plans to fail, leading to an increased chance of a breach of security:… Continue reading Security strategy – do you audit it?

Don’t forget to audit your security

The security of your computer, network and whole system is likely something that has caused moments of stress and even worry. In order to ensure that a business is secure, companies often adopt a security strategy. While these strategies are great, there is one common element that many businesses forget to carry out – the… Continue reading Don’t forget to audit your security

All about Apple’s SSL bug

As a business owner or manager you face important security issues on a daily basis to look after business computers and systems. From malware to bugs in software, there is almost always a security issue to be dealt with and it can be an uphill battle dealing with them. But, knowledge is power and knowing… Continue reading All about Apple’s SSL bug

About the recent Apple SSL bug

Ensuring the security of your systems and computers can sometimes seem like a full time job and an uphill battle, especially with the increasing number of security issues being discovered. From bugs in software to malware, there is almost always some attack challenging the system security and potentially leading to a security breach. The other… Continue reading About the recent Apple SSL bug

Apple’s SSL security bug defined

Keeping systems and computers secure can seem like a full time job, largely because there is a near constant stream of security issues being discovered. From malware to bugs in software, you can bet that you will eventually find a security breach in your systems. The other week news broke of a bug that posed… Continue reading Apple’s SSL security bug defined

What is spear phishing?

One of the most common threats to business and individual systems is phishing. This form of hacking is well known and many users have educated themselves on the more traditional methods used by hackers. This has forced hackers to come up with different phishing techniques, and one of the methods that is causing problems is… Continue reading What is spear phishing?

Spear phishing defined

There are numerous ways business security systems can be compromised. A common way is phishing – tricking people into giving up important information via email. Original phishing methods are now well known, and increasingly less effective. So hackers have become more skilled and have adapted their phishing methods into a new form of catching people… Continue reading Spear phishing defined

Have you heard of spear phishing?

Computer and network security is an important issue to many business owners and managers. One of the most common security threats companies come across is phishing. Because phishing has become so prevalent, most people are aware of these underhand methods. This has led to hackers having to come up with new phishing methods, one of… Continue reading Have you heard of spear phishing?