Helping clients manage their technology for over 30 years.

Cybersecurity best practices:
Paying attention to these 10 basics helps prevent ransomware attacks

7 security best practices: Preventing ransomware attacks — with...  by Quest

A commitment to the seven people-focused cybersecurity best practices I reviewed in my last post will thwart many attacks. But don’t forget these 10 key cybersecurity best practices basics:
Continue reading

Think it can’t happen to you? Think again

Target with a cluster of bullet holes around the bulls eye.

Two kinds of security threats have emerged of late that need special attention, even if you’re running a small enterprise: Targeted zero-day attacks and advanced persistent threats.

Targeted zero-day attacks
Microsoft’s recent Internet Explorer security flaw (see my last blog post) is a fine example of a zero-day attack. The attackers got their edge from speed, since reactive countermeasures that depend on threat signatures — such as patching and tools like antivirus software and intrusion prevention — couldn’t be updated fast enough to halt the flaw.

Continue reading