Cyber attacks are evolving. Make sure your technology does too. By Tim Coach, RESULTS COO

In 2020, it will be more important than ever to keep up with what’s affecting technology and the small business. Most cyber attacks occur because of weak, outdated technology that can’t keep up with the latest ransomware, virus, malware or phishing scheme.

Ransomware is like the flu … it’s constantly evolving

More and more, ransomware has emerged as a major threat to individuals and businesses alike. It's distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.

Unless you’ve been living under a rock, you are probably well aware that ransomware is a hot topic in the news these days.

Be careful of who you invite in! By: Mike Gilmore, RESULTS Chief Technology Officer

As a boy, I used to watch the old Christopher Lee Dracula movies on Saturday nights. Dracula and other vampires in these movies couldn’t enter a house unless they were invited in. The fearless vampire hunter heroes knew this, but somehow there was always someone in the house that defeated security by helpfully throwing out that smelly garlic and opening up the windows to let in some fresh air.

Thinking of virtualizing your server? Keep these 3 things in mind.

Virtualizing your servers, networking devices, and other machines can drastically lower costs and dramatically shorten IT infrastructure deployment times. However, implementing this requires a lot of IT support expertise that can’t just be pulled off by regular technicians.

Are the encrypted sites you visit safe?

You can easily tell whether a website is encrypted, and therefore safe, if a padlock icon appears next to its URL and if it starts with HTTPS (instead of just HTTP). Unfortunately, hackers now use the very same tool that’s supposed to protect browsers from malicious entities via encrypted phishing sites. How hackers use encryption […]

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc. Here’s how different types of malware work and […]

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across businesses all over the world. Although it shares the same qualities as WannaCry — a ransomware deemed ‘one of the worst in history’ — many cyber security experts are calling it a more virulent strain of malware that could cause greater damage to both small […]

New ransomware demands sacrifice

It’s a scary to think you can be simply browsing the Internet when WHAM! a screen pops up out of nowhere claiming that you have been hijacked and will need to pay a bitcoin to free your computer. Unfortunately, ransomware like this is not uncommon. But now there’s a new, more devastating virus that asks […]

Potential IT security issues in 2016

As a small or medium-sized business owner or manager, it’s only to be expected that you want to keep your company safe from cyber attacks and hacking attempts. But how much do you really know about online safety? With massive corporations such as Sony falling victim to attack, cyber security has never been more in […]