Did you know that 25% to 45% of businesses never reopen after a disaster? Or that out of the businesses that do re-open, almost 70% of them go out of business within the year, whilst only 6% survive long-term? Some
There have recently been two discovered vulnerabilities, currently going by the names Meltdown and Spectre. These vulnerabilities affect most modern processors (including Intel, AMD and ARM), and allows an unauthorized process access to privileged system memory. These vulnerabilities are at
There are a number of different ways a criminal hacker can implement a cyber attack, and they all depend on what the criminal hacker is trying to gain. Some criminal hackers want data, whereas others want a ransom fee to
Physical Security There are ways to lock your laptop down from outside of the machine. First, be sure that your laptop bag is always on your person, or that you use a padlock to keep the zipper securely closed. Most
Hook up to a network that you know. Free Wi-Fi is tempting, but be sure that you consider who is providing the connection. Public connections at the local coffee shop are usually unsecured and leave your machine open to outsiders.
Having a strong password is one of the most effective ways to increase your online security and protect your data. It can also be straightforward, so you’d expect it to be something that almost everyone does. It doesn’t seem that this is
The Internet has long been a great tool for business, but you can’t take advantage of it without putting your sensitive data at risk of threats, like hackers and malware. Granted, when it comes to cybersecurity, even the most cautious
In the last few days there has been a lot in the news about the WannaCrypt Ransomware outbreak. Because of the impact this has had Microsoft has released patches for this vulnerability that cover their older operating systems that are