Author: Margie Matrisciano

Fake virus messages have been popping u i browsers for years. A pop-up window alerts you that your computer is infected with viruses and the only option to get rid of the pop-up is to click OK. It encourages you to scan your device with...

Someone sets up an open-access Wi-Fi hotspot in a high-traffic area such as a coffee shop or airport that’s connected to their laptop. Once you join, this person has access to your computer and mines it for financial and personal data. Keep your devices safe by...

Someone duplicates a social network profile belonging to a friend and then adds you. Once you confirm, the person has access to personal information that can be used to hack into your accounts, such as your birthday, parents’ names, and pets’ names. They can also...

Scammers access one of your associates’ email accounts or social networks and send out fake emails or direct messages to all of his or her contacts. They often include an attachment or a link to a fraudulent file-sharing website and ask you to download a...

How it works: This phishing scheme involves receiving a fraudulent email that looks like it came from your actual social network. It may say you have new, urgent notifications or that someone is erroneously trying to access your account and you need to sign in to...

Does your company’s network closet look like many other organizations -- a spider web of cables crammed into a tight storage space? There’s no color coding, neatly wound wires or racks with room to grow. And, how do you even begin maintenance in that jumbled...

Advanced cyber attacks are plaguing organizations of all sizes, with more and more cyber criminals targeting small to midsize businesses that are without dedicated IT security teams. With threats constantly changing and evolving, there will never be one defense to combat all these threats. You...

Managing Security is a complex undertaking to do it right. Each day new threats are evolving and targeting small to midsize businesses just like you. Whether it’s a physical or virtual infrastructures, or security coverage across networks, endpoints, and Wi-Fi environments, you need total security...

The number of cyber attacks are at an all-time high with no signs of slowing down. To make matters worse, cyber criminals are focusing on small to midsize businesses, as they see you as easy targets compared to large organizations with dedicated IT security teams. Don’t...

  • 1