On the morning of Friday, February 3, 2017, the Toys “R” Us IT security team identified an attempt to gain unauthorized access to the Reward “R" Us accounts between the time...
Cybersecurity
GMail will no longer allow the sending of JavaScript files
There should be few reasons to send a JavaScript file (.js) through email, but if you do find yourself trying to send, you may run into some trouble. Starting in February of...
Why the UTM is the Ultimate Security Solution for Businesses
Though network security is a necessity, it’s difficult to plan for every single possibility. Small and medium-sized businesses have trouble accounting for the many threats...
A Look Back at 2016’s Biggest Cyber Security Stories
2016 saw many notorious data breaches, along with developments in malware and other threats to security. It’s always helpful to reflect on these developments so that the...
Be Aware of the Latest Phishing Attack!
You’ve probably seen the headlines. Fake celebrity death news is the new clickbait of the week, the latest one being George Michael. You have probably seen it in ads on...
Too Many Smart Devices Have Dumbed-Down Security Protocols
In both the home and the business, security cameras are becoming more and more commonplace as a means of preserving security. However, some malware can turn these devices,...