View blogs | Login
28
Sep
2018

6 Ways to Identify a Phishing Email

In our last post, we discussed the latest growing trend in cybercrime, fake ransomware. One thing we did not touch on is how ransomware both real and fake infects your computer and devices. The most common way ransomware invades your computer Is through
By:
Catherine Hoy
Views: 0
14
Sep
2018

Fake Ransomware is NOT Fake News

You see this message pop-up on your computer screen: and realize your computer is under the attack of ransomware. All of your important files and documents become encrypted and they only way to access the decryption password is to pay the ransom fee b
By:
Catherine Hoy
Views: 0
31
Aug
2018

5 Reasons Your Company Should Have a Data Recovery Plan

Cyber Security threats and data loss are nothing new, so why is it that 47% of small businesses still don't have a data backup plan? Every business, large or small is built on data to keep running and no business is impervious to a potential cyber atta
By:
Catherine Hoy
Views: 0
22
Aug
2018

Good Passwords Are Key to Good Security

What are the most important measures you can take to improve your online security? Research done by Google shows that security experts answered this question with a focus on password security. Passwords should be strong and unique, they should not inc
By:
Catherine Hoy
Views: 0
31
Jul
2018

5 Advantages of Cloud Backup

Managing and protecting data has become an integral practice for many businesses. As technology advances, the cloud is becoming a popular trend among data based tools, backup being one of them. We want to discuss 5 advantages cloud backup has over is pred
By:
Catherine Hoy
Views: 0
25
Jun
2018

Best Practices to use to Effectively Work From Home this Summer

Working remotely has slowly become the new norm for many business and employees. According to a Gallup Study, 43% of Americans reported they spend some of their work week in a remote location. Now that summer has officially started, these numbers will ris
By:
Catherine Hoy
Views: 0
18
May
2018

Evolution of Ransomware

Ransomware has been around for decades, however within the past year, we have seen an influx of high profile attacks. WannaCry, the most notorious for 2017 is one of the most devastating attacks in ransomware history. According to Barkly, as of 2017
By:
Catherine Hoy
Views: 0
13
Apr
2018

Spring Cleaning your Devices

Spring has finally sprung, and for many this means its time for the annual purge know as spring cleaning. While most opt to declutter their homes, closets, and cars theres one space that is often left out. Their digital space. Taking the time to clean out
By:
Catherine Hoy
Views: 0
19
Mar
2018

What is GDPR?

In the age of the internet, privacy is a huge concern and when a data breach occurs personal information gets lost and even stolen. It's not always know where this information winds up, but it is almost always in the hands of someone with malicious intent
By:
Catherine Hoy
Views: 0
7
Dec
2017

MailSploit Allows Hackers to Perfectly Spoof Emails

Faking your identity is nothing new when it comes to the internet. Scammers, identity thefts, and cat fishers have been doing it for years. But thanks to a discovery made by Sabri Haddouche, we can now spot email fraudsters before they strike. On Tuesda
By:
Catherine Hoy
Views: 0

About Catherine Hoy

Image for Catherine Hoy

Archives

Bloggers

Navigation

Social Media

Powered by 10MinutesWeb.com