5 security measures made easy

5 security measures made easy

Let’s face it, keeping yourself free from online threats can be a pain: using different passwords for every site, changing them every three months, using advanced encryption, the list goes on and on. You either end up paranoid of being online or give up altogether....
WordPress 4.5.3 patches security vulnerabilities

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the most vulnerable...
Game Over: NBA team losses valuable data

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the Milwaukee Bucks...
Ransomware to begin self-propagation

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted campaigns. The best way to...
Are your site’s images hiding an attack?

Are your site’s images hiding an attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now something you should...
Understand these 4 types of hackers

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can help you understand...