Blog

About the Petya Malware Outbreak

About the Petya Malware Outbreak

It’s a ransomware attack with the ability to self-propagate. It also uses exploits from the April Shadow Brokers dump of NSA hacking tools. The WannaCry attack began on Friday, May 12th and spread rapidly through Europe and the rest of the world, affecting millions of systems.

Does the CIA have access to your router?

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.

The Wikileaks CIA documents

For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Get more out of Office 365 with Power BI

Get more out of Office 365 with Power BI

The benefits of Office 365 have totally changed the way most businesses operate, and it’s hard to believe anything else could have been added to make it even better. But lo and behold, Microsoft has added another excellent feature for getting a better return on your productivity software investment.

Using Pinterest to market your SMB

Using Pinterest to market your SMB

Many small- and medium-sized businesses are abandoning traditional marketing methods in favor of social media platforms, and for good reason. Take Pinterest, for example, whose latest product “DIY Promoted Pins” allows businesses to promote their Pins to increase click-throughs, improve reach, and potentially drive more website traffic.

DR tips for hurricane season

DR tips for hurricane season

This year, the National Oceanic and Atmospheric Administration (NOAA) predicts up to four unusually active hurricanes. With that in mind, there’s no better time to test your disaster recovery (DR) plan. But to avoid data loss and expensive downtime from such catastrophes, there are several things that need to be accounted for.

Online Training from Idealware —Raising Your Online Security IQ – June 15

Online Training from Idealware —Raising Your Online Security IQ – June 15

Can you detect a phishing scam or a clever attempt at social engineering? How strong are your passwords? Do you know how to keep people from spying on your phone? If any of these questions make you nervous, join us for this training session, designed and led by Joshua Peskay of RoundTable Technology. We’ll help you spot threats to you and your nonprofit and teach you how to reduce the risk and protect your data.

How did WannaCry spread so far?

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks as one of the most effective pieces of malware in the internet’s history, and it has everyone worried about what’s coming next. To guard yourself, the best place to start is with a better understanding of what made WannaCry different.

Protect your data from WannaCry

Protect your data from WannaCry

This month, ransomware has taken center stage yet again. WannaCry has already infected thousands of users around the world. In true ransomware fashion, WannaCry holds user data hostage until the victim decides to pay the ransom. What’s more alarming, however, is that the global success of this malware will likely spawn even more potent variants.