Deep and dark web hackers buy and sell all kinds of personal information. They sell stolen credit card numbers for as little as $9 and if the card uses a unique one-time payment code even that is available for the right price. Credit card numbers are far from the only...
Telcom and Cyber Security Blog
FBI Warns of ATM “Jackpotting” Threat
About a week ago, some scary information started making the rounds. The Telegraph reported that the FBI had issued warnings that there would potentially be a hacking attacking on ATMs worldwide. There was a threat that hackers would be unleashing a “jackpotting”...
Malware 101
In our previous post we discussed the Russian malware known as VPNFilter. In this post, we figured we should pull back a little and give you a rundown on malware in general. You’ve probably heard lots of terms associated with malware - viruses, rootkits, Trojans,...
Russian Malware and Protecting Your Business
Hello Internet! We're reopening our blog, and we figured a good place to start would be a discussion of a current event. In this post we'll be discussing why the FBI has asked people to reboot their routers. The reason? A bit of Russian malware called VPNFilter. A bit...
Securing Wireless Networks
Undoubtedly, Wi-Fi has made it very easy for organizations to connect to the Internet from a number of devices, such as desktops, laptops, tablets, and mobile phones. While Wi-Fi networks are certainly more convenient than wired networks, Wi-Fi networks do pose a...
4 Ways to Avoid Data Breaches
In the current era of data, we face an ongoing risk of data loss, be it through hacking or system failures. The data you hold on your computer systems is crucial for your business; as such, it is critical that you Avoid Data Breaches Why should you care...
Is Your Business Due for an IT Assessment?
It is critical for businesses to conduct thorough IT assessments regularly so they can identify security violations, monitor performance, and document network developments. An IT assessment can also help firms to ascertain the ways in which technology can enhance...
The Benefits of Using a Network Proxy Server
One way to reduce the risks associated with business Internet activities is to use a network proxy server. A proxy server can be considered as the guardian of your network. It sits between your internal and external network servers and works to filter and monitor...