Tales from Ransomwhere: Shadow Copies
It is difficult to recover files that were kidnapped by ransomware without paying the criminals. In this new chapter we will clue you in on some tricks.
The biggest vulnerability in businesses: the lack of qualified IT professionals
While the risks associated with digitalization increase, the number of trained cybersecurity professionals remains low. In a recent study, it was estimated that around one million IT experts are in need worldwide.
Protect your data from device theft
Today, technology is all around us, and it comes with both the good and the bad. Make sure you take precautions before going on vacation this summer!
Pokémon Go, the trendiest, most dangerous game of the moment and why employers are banning it.
Don’t be fooled by its short history, Pokémon Go has already conquered millions of Smartphone users all over the globe, however there are extreme consequences of this game in the workplace.
Watch out for Chrome and Firefox web extensions that access browser history and rob passwords
Malicious extensions can save and modify permissions, gain access to your browser history, and modify the pages you visit or save the passwords you use.
Your fingerprint could be copied and used to unblock your iPhone (but it’s not a bad thing!)
A high quality photograph is sufficient enough to reproduce a fingerprint, using various techniques, molding different materials, which could even be used later to impersonate the person. But this is not always a negative thing. Learn more!
Protect your business from malvertising: stop your employees from clicking malicious ads
Malicious advertisements, called malvertising, are capable of getting into anyone’s computers. Have you been trained on how to prevent these threats in your business environment?