Cyber Security Windows

Windows 8.1 Just Lost All Support. What you need to know

Companies both large and small share this one cybersecurity problem. They have computers that are still running older operating systems. Staff might use these devices only occasionally. Or the company may be running customized software that won’t run on newer OS versions. The problem is that when the OS becomes outdated, the system is open […]

Cyber Security Technology

What not to do on your Work Computer

Whether you work remotely or in an office, the line between personal and work tasks can become blurred when working on your company computer. If you’re in front of a computer for most of your time during work, then it’s not unusual to get attached to your desktop PC. Over time, this can lead to […]

Cyber Attack Cyber Security
cyber

Cybersecurity Attack Trends for 2023

The new year has begun and it’s a time of renewal as we plan for the possibilities to come in 2023. It’s also a time when you need to plan for resiliency in the face of ever-present cyberattacks. Sixty-eight percent of surveyed business leaders feel that cybersecurity risks are getting worse. They have a good […]

Cyber Security Operating System

How Process Explorer Enhances Cyber Security

🔍How Process Explorer Enhances Your Cyber Security Sysinternals Process Explorer is a powerful tool for I.T professionals to monitor and manage system processes, security, and performance.  The software, free to download from the Sysinternals website, was originally released in 1996 by Mark Russinovich and Bryce Cogswell and has since evolved to offer a comprehensive set of features […]

Cyber Awareness Cyber Security
image

Signs that Computers Are Infected with Malware

Approximately 34% of businesses take a week or longer to regain access to their data and systems once hit with a malware attack. Malware is an umbrella term that encompasses many different types of malicious code. It can include: The longer that malware sits on your system unchecked, the more damage it can do. Most […]

Cyber Awareness Cyber Security
featured

Mobile Malware Increase – What Should You Do?

Cybersecurity researchers uncovered an alarming mobile statistic. During the first few months of 2022, mobile malware attacks surged by 500%. This is alarming both in scale and because many people aren’t yet protecting smartphones. For years, mobile phones have become more powerful. They now do many of the same functions as a computer – just […]

Cyber Security WindowsServer

Threat Hunting with Sysmon

 🥊Threat Hunting with Sysmon As Cyber Threats continue to evolve, it is vital to have tools and strategies in place to detect and respond to malicious activity on our systems. One such tool is Sysmon, a system monitoring tool that can help detect and identify suspicious behaviour. Below we will explore how Sysmon can be […]

Cyber Awareness Cyber Security Technology
gifts

5 tips for safe online shopping this Christmas

🎁 5 tips for safe online shopping this Christmas: 👀 Use a secure payment method to protect your personal and financial information. Some options include using a payment service like PayPal or a digital wallet like Apple Pay or Google Pay. 👀 Shop with reputable retailers: It’s important to shop with retailers you know and […]

Citrix Cyber Attack Cyber Awareness Cyber Security

New Citrix CVE-2022-27518 vulnerability

❗ Security alert ❗ Citrix has just announced a vulnerability discovered in Citrix Gateway and Citrix ADC. Citrix ADC or Citrix Gateway appliances configured as a SAML SP or a SAML IdP are affected by the CVE-2022-27518 vulnerability, which allows unauthenticated remote arbitrary code execution. The following supported versions of Citrix ADC and Citrix Gateway are affected by this […]

Cyber Security Microsoft 365 Technology
Microsoft 365

M365 Business Premium as a Secure Workspace

🔒There has never been a more crucial time to secure our data, devices and people’s corporate identities. With the advent of cloud computing and remote working, employees and freelancers can access company information from any location.  This presents a problem for businesses that need personnel to be able to access sensitive data securely wherever they […]