Defending your systems against malicious threats is best handled by layered protection. We are now offering another layer with a best-in-class Web Protection service that will keep your users safe and productive. It complements traditional antivirus engines and firewalls by letting you define your own content-filtering policies, website blacklists, time-based and content-based browsing policies, and much more.
This service is immediately available! Contact us today to discuss pricing and a roll-out strategy for your team.
Unfortunately, malicious software seems to be hiding in every corner of the Internet these days and for ICS technicians, it feels as though we are playing an unending game of Whac-A-Mole. It is part of our job however and we will keep battling on your behalf!
Continue reading “Malicious Software Terminology”
I think we have all witnessed smartphone addiction in our lives. It could be at the hands of friends, family, or even yourself.
Continue reading “Smartphone Addiction”
It has been 2 weeks since the largest ransomeware attack in Internet history. Although it may have been the largest, it certainly wasn’t the first and definitely won’t be the last. Continue reading “Wannacry Ransomware Another Reminder to Stay Vigilant”
Two-Factor authentication (2FA) is available on most major services; think Gmail, Facebook, Twitter, etc. But what is it?
Continue reading “Using Two-Factor Authentication (2FA)? You Should Be”
Do you have a Gmail account? Be informed on this very sophisticated phishing scam so you don’t unknowingly give up your Gmail credentials to hackers.
Continue reading “Sophisticated Gmail Scam Could Reveal Your Credentials”
There is a lot of information all of us probably feel is personal, yet it is publicly available due to property records, business records, utility records, etc. One web site in particular is aggregating your information and offering it to anyone that enters your name in a search. Continue reading “Opt-Out: This Web Site is Publicly Aggregating Your Personal Information”
You should always be cautious of links you receive in email messages, especially when the link is requesting account credential confirmation. Continue reading “Beware a New Amazon Shipping Scam”
Simply viewing a maliciously crafted photo ( of jpeg type) on your iPhone, Mac or Apple Watch, whether in an email or on the web, could allow a hacker to execute malicious code. Continue reading “An Important Security Update for Apple Software (iOS, macOS, watchOS)”