by Chuck Rutenberg | Sep 27, 2018 | Cyber Threats
Today, we’ll be discussing one of the sneakiest and most common types of malware out there: Keyloggers. In the following article, you’ll learn everything you’ll need to know about this type of spyware: What they are The risks they pose How to detect them Why malware...
by Chuck Rutenberg | Sep 18, 2018 | Cyber Threats
In the fall of 2013, an employee of Fazio Mechanical, a refrigeration vendor serving the Target department store chain, received an email that convinced the employee to open an attached file. The file contained a malware program that spread itself to other Fazio...
by Chuck Rutenberg | Sep 11, 2018 | Cyber Threats
Despite the growing visibility of major computer and network security breaches and the staggering amount of data that has been compromised, a surprising number of companies both large and small grossly underestimate the cost of keeping their networks, computer...
by Chuck Rutenberg | Sep 6, 2018 | Cyber Threats
When we think of cyber attacks as security threats to businesses, it’s easy to imagine teams of hackers cooking up new ways to break our established security systems. We have plenty of antivirus and activity monitoring tools at our disposal, so it makes sense that...
by Chuck Rutenberg | Sep 4, 2018 | Cyber Threats, Healthcare IT
Software is your healthcare clinic’s biggest vulnerability. If you’re like most modern healthcare offices, you’re using multiple Electronic Health Record (EHR) platforms and software applications for your day-to-day operations: You might manage active schedules and...
Recent Comments