Posts

Virtual DR: The best anti-ransomware tool

From CryptoLocker to WannaCry, ransomware has grown in sophistication…

It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether…

Beware of a new Locky-type ransomware

Disguising itself as an invoice proved to be an effective approach…

Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of…

Nyetya ransomware: what you need to know

Nyetya, a variant of the Petya ransomware, is spreading across…

How did WannaCry spread so far?

By now, you must have heard of the WannaCry ransomware. It ranks…

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention…

Managed services for cyber security

Ransomware, Trojan horses, spyware and malware are things small…

New ransomware demands sacrifice

It's scary to think you can be simply browsing the Internet when…

IT jargon: a glossary of cybersecurity terms

Everyone hates jargon. It’s ostracizing and off-putting, but…