The latest WordPress release fixes major issues

The latest WordPress release fixes major issues

Although WordPress is more secure than it used to be, outdated installations can be a potential threat to your website and the data that is hosted on the servers. In an attempt to shut down hackers before they can exploit vulnerabilities, the WordPress security team recently rolled out a new version that patches security loopholes and fixes several known bugs.

NBA team latest victim of spoofed email

NBA team latest victim of spoofed email

According to Yahoo! Sports, last month a Milwaukee Bucks team employee unknowingly sent out names, addresses, Social Security numbers, compensation information and dates of birth of players to a spoofed email account operated by a hacker. Before we judge too harshly, the Bucks are simply the latest victim in what is a threat to businesses of all sizes.

Threat alert: self-replicating ransomware

Threat alert: self-replicating ransomware

Microsoft recently announced the detection of self-propagating iterations of malware. With this evolution, it is important for SMBs to update their understanding of this security threat in order to properly protect themselves.

Ransomware, the malware that encrypts data on infected systems and demands payment to return access to users, has been steadily increasing its infection rate this year.

Image uploader security flaw discovered

Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

4 Security risks to consider with BYOD

4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly.

Is your computer infected with malware?

Is your computer infected with malware?

Has your computer been running slow lately? Are you getting a bunch of unwanted pop-ups? Then it’s possible your system’s security has been breached. Being able to identify whether or not your computer is infected with malware will allow you to quickly come up with antivirus solutions to protect your system.

Should you monitor your employees online?

Should you monitor your employees online?

To monitor your employees, or not to monitor, that is the topic of this blog post today. If you’ve ever considered monitoring your staff’s online activities, you may’ve been lost as to whether or not it’s the right decision. So we’ve listed the pros and cons of doing it, and some tips to make it a success if you go through with it.

IT security concerns in the finance sector

IT security concerns in the finance sector

The time to increase cyber situational awareness and establish better security strategies has never been more opportune. Since 2015, the number of attacks on the financial services sector has increased and shows no signs of letting up. Whether it be extortion or credential-stealing malware, different tactics are utilized to target desired areas.