With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]
In the cybersecurity world, an insider threat is an individual or business partner who uses company data inappropriately. Today’s companies must take proactive steps to prevent insider threats, which is why we put together some tips and tricks. #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]
More and more, ransomware has emerged as a major threat to individuals and businesses alike. It's distributed in a variety of ways and is difficult to protect against because, just like the flu virus, it is constantly evolving.
Unless you’ve been living under a rock, you are probably well aware that ransomware is a hot topic in the news these days.
If your business is running on a Windows 10 operating system (OS), you should be careful of Snatch, a new strain of ransomware that can easily bypass its security protocols. Discovered by a research team in Sophos, this malware can slip through Windows 10’s security software by rebooting your computer in Safe Mode and disabling […]
Fear the Spear: How to avoid being a victim of spear phishing
By Mike Gilmore, RESULTS Technology Chief Technology Officer
Phishing emails are a well-known and mostly annoying daily reality for most of us and not surprisingly, the banking industry is one of the top targets of hackers. All banks have email security protections in place, and most of the phishing attempts are obvious and easy to avoid. These “scatter shot” or “spray-and-pray” attacks rely on sending a high volume of generic emails to catch a few bites from gullible targets.
Thorough IT infrastructure builds tend to be cost-prohibitive and consequently, difficult to justify for many businesses. Hyperconvergence is a great alternative to traditional IT builds, both in terms of cost and robustness. What are hyperconverged infrastructures? In a traditional IT environment, networking, server, and storage hardware need to be purchased separately and configured to work […]
Join RESULTS Technology for our final Small Business Event of the year and enjoy lunch on us as we present Cyber Security for the Kansas City Business. Our speaker for this event is FBI Special Agent George Schultzel. He will discuss topics on what cyber crime looks like, how small businesses are targeted, and what you can do to make sure your company is not the next victim.
RESULTS Technology has joined the National Cybersecurity Awareness Month (NCSAM) initiative, held annually in October, by signing up as a Champion and joining a growing global effort to promote the awareness of online safety and privacy. NCSAM is a collaborative effort among businesses, government agencies, colleges and universities, associations, nonprofit organizations and individuals committed to this year’s NCSAM theme of ‘Own IT. Secure IT. Protect IT.’ which encourages everyone to #BeCyberSmart through cybersecurity best practices.
We hear a lot of talk about data security because of the constant threat of cyber attacks and hacking. News of data breaches are extremely common. You may find yourself dwelling on the threat ... what would you do in the event of a disaster? How would you access your data? Luckily, there is a broad range of solutions available, some of which can be money-saving, that can help mitigate risk.
Over the last few years, different versions of ransomware have sprung up, all aimed at extorting money from your business. Before you even consider paying for the release of your data, the first thing you must always check is if there’s a free cure for the ransomware that infected your systems.