by Leeanna Raposo | Jun 7, 2019 | Articles
Microsoft discovered a potentially dangerous vulnerability, exposing older versions of Windows to cyber-attacks. This flaw, known as BlueKeep, is so severe that it could create an attack as big as the WannaCry ransomware from 2017. After several warnings to install...
by Leeanna Raposo | May 30, 2019 | Articles
Cybercriminals want one thing; information. After all, “information is power,” and what better way to get power than to steal sensitive information and hold it hostage? Ransomware is a common type of virus because it is highly profitable for cybercriminals. There are...
by Leeanna Raposo | May 30, 2019 | Articles
By Ed Desorcy A record number of consumers and businesses are relying on a cloud backup model as their only form of data backup. Cloud backups offer seamless ease of use, fast deployment, scalability and low up-front costs, but how safe are they really? What is the...
by Leeanna Raposo | May 15, 2019 | Articles
Many companies were started because someone asked an innocent question. The invention of the Polaroid Instamatic Camera was triggered by a question. The three-year-old daughter of the inventor, Edwin H. Land, asked her father after he took her photo, “Why do we have...
by Leeanna Raposo | May 3, 2019 | Articles
Written by Ed Desorcy As we’ve highlighted in our Scam School articles, phishing is one of the most common and successful attacks out there. Phishing is described as someone with malicious intent requesting a piece of information through email from a victim under the...
by Leeanna Raposo | Apr 17, 2019 | Articles
James O’Toole, a professor and leadership expert once said, “95% of American managers today say the right thing … 5% actually do it.” On every front, poor leadership is destroying companies. Unnecessary turnover of employees and disengaged employees,...