Denial-of-service attacks continue to grow in frequency and size. But are all DDoS attacks the same? And what motivates people to launch one of these attacks?
Find answers to these questions and more in this post. You’ll also see the most common types of tools and targets for application-layer attacks.
Continue readingSee which threats are growing fastest, which industries are targeted the most, and how one in four data breaches last year hit a POS system.
You’ll get this and more in our summary of the Verizon 2015 Data Breach Investigations Report. The report is a whopper at 60+ pages. We highlight our 10 favorite charts to get you up to date and save you time.
Continue readingHealth IT departments are looking to make big investments in 2015. If you know their plans and concerns, you can beat the competition and offer the services your clients want most.
Find out how health IT departments are planning to spend their technology budgets this year. You’ll see why security is a major priority, and how mobile technology is predicted to continue expanding.
Continue readingFocusing your marketing and sales efforts on a niche can be a great way to accelerate growth at your IT business. Once you land your first client, your second, third, and fourth can be just a referral away.
One Calyptix partner has had great success selling in the market for dental IT and integration. Read on to see his tips and secrets for breaking in.
Continue readingDid you know more than 75% of phishing emails seen by Mandiant last year impersonated the IT staff or an antivirus solution? Scarey, right?
Learn more about this threat and others highlighted in Mandiant's latest report. You'll also see which industries are attacked most (not the ones you think) and why VPN is a growing target for attackers.
Continue readingPCI compliance is rising across the industry, but did you know that four out of five organizations that achieve compliance fail an assessment less than a year later? That finding and more comes from Verizon’s 2015 PCI Compliance Report.
In this post, see which PCI requirements are most correlated with having a data breach. You’ll also see why we expect a rise in card-not-present fraud and why maintaining compliance is so difficult.
Continue readingThe threat of ransomware continues to loom over us in 2015, and some expect the storm to get worse before it clears. How can you ride out this threat?
Get the five ways to prevent a ransomware disaster at your business. We sat down with expert Amy Babinchak to get her view. Includes a link to her team’s free Cryptolocker Prevention Kit.
Continue readingDenial of service attacks used to be a mere annoyance. Today, they are a major threat to businesses and organizations worldwide – and they are getting stronger.
See how recent DDoS attacks point to trends that we expect to see in 2015. You’ll see our predictions for the coming year and the latest record-breaking attack to hit the news.
Continue readingSmall businesses are hit hard by hackers. Here is proof: a 3-minute news clip with a small business owner who may be forced to close if hackers strike again. Also included are comments from Calyptix CEO Ben Yarbrough.
This can be a great clip to share with your clients. It shows the costs of cybercrime on a small business (more than $10,000 in just a few months) and it proves that the threat to small business is real.
Continue readingCritroni is back for more in 2015. The ransomware still encrypts files and demands a ransom, but a few things have changed since we saw it last summer.
What's changed? How can you unlock your files? Find out inside, and see how you can avoid this menace altogether.
Continue readingYou could get away with updating a firewall once a month, or maybe even once a year, in the past. Today, that's very unwise. You need to check for updates every day automatically.
See the 7 reasons why you should toss out your clients dated, manual firewall. If it updates manually, it's time to go.
Continue reading