Cyber security is becoming a minefield of legal risk. One wrong step can blow your business sky-high.
See three legal hazards for your IT business related to cyber security. You’ll get detailed descriptions and solid advice to keep your business safe.Continue reading
Advanced hacker groups are attacking MSPs in an active campaign of cyber attacks, according to an alert from the U.S. Dept. of Homeland Security.
Who is behind the attacks? What do they want? And how do you protect your IT business and your clients? Find out here.Continue reading
Charlotte, NC – A new federal law is expected to bring “clear and concise” resources to help small businesses protect against the growing threat of cyber attacks. Signed on Aug. 14, the NIST Small Business Cybersecurity Act requires the National Institute of Standards (NIST) to “disseminate clear and concise … Continue reading
Social engineering tactics are on the rise among hackers. More are calling victims and sending text messages – trying to con them into downloading remote desktop software or install malware.
See the top social engineering tactics used today in cyber crime. Raise awareness to arm yourself and your staff against phishing and con artists both in person and online.Continue reading
Did you know that some security products can make you less safe online? Researchers found one feature – HTTPS traffic inspection – almost always harms the security of people who use it.
Find out how SSL filters harm the security of millions of people every day, and also see how the HTTPS web filter in AccessEnforcer is different.Continue reading
Small businesses take note: denial-of-service attacks continue to grow in strength and hundreds of thousands are launched each month.
See the latest trends in DDoS attacks – including two record-breakers this year that shocked security researchers.Continue reading
Everyone knows who to blame for a data breach – the bad guys. But what happens when one of the good guys makes a mistake? Unfortunately, the impact can be just as severe.
Check out two major threats to cyber security in healthcare: software flaws and misconfigurations. See how a coding flaw from a vendor of a fat-finger from your coworker can lead to your next HIPAA breach.Continue reading
Charlotte, NC – Calyptix Security today added another voice-over-IP (VoIP) phone service to the list of those supported by the company’s flagship product, AccessEnforcer UTM Firewall. RingCentral is the latest … Continue reading