How to Protect Your Twitter Account from Targeted Phishing Attacks

The Syrian Electronic Army, a hacking collective which seems to be pro-Syrian government, has been on a Twitter hacking roll lately. They’ve managed to compromise the accounts of many major news outlets, notably the Twitter account of the Associated Press, the Guardian, E! The compromised accounts were then used to spread pro-Syrian government messages and […]

Continue reading

Who’s about to go crazy this March Madness?

Is it your IT administrator who needs to sort out all of the bandwidth issues? Is it your employees who want to access work-related resources on the web and cannot because of people streaming March Madness games?

Continue reading

Control the Harlem Shake in Your Business

The latest craze to go viral on the web is the dance song Harlem Shake, with hundreds, if not thousands of people, gathering in costume to do ‘the shake’ in every conceivable space. Harlem Shake follows hot on the heels of another Internet ‘sensation’ – Gangnam Style; a song and dance routine that racked up […]

Continue reading

What the hack?

The past few months have been characterised by a number of high-profile hack attacks. What the hack is going on? (Pardon the pun!) Quite a few things actually:

Continue reading

Stopping the Spread of Malware

We may think that stopping the spread of malicious software is the job of security system vendors. There are, however, a number of things we can do to prevent malware from spreading and causing damage. Let’s look at a few simple ones.

Continue reading

7 Reasons Why Software Solutions Are Ideal For SMBs

You’re looking for a product that suits your company’s budget and requirements and the first question that will go through your head is “should I opt for software or get a hardware solution?” Both software and hardware have their advantages and disadvantages and it all depends on what the IT manager is looking for and […]

Continue reading

Take back Control of Your Bandwidth

It is a well known fact that IT Administrators are one of the least recognized and appreciated roles in a company. It is certainly true that people are quick to whine and fret when something is not working, but nobody calls to say “thanks” when everything is running smooth. One of the most common complaints […]

Continue reading

10 Steps to Gain Effective Web Security

Achieving comprehensive web security within the organization is not a trivial task. This is especially so for businesses with limited IT budgets, limited manpower, and other practical limitations. Having a good web security setup in place is a challenging feat by itself – besides all the other challenges that an IT administrator for a SMB […]

Continue reading

2012 – The End of the World as We Know It?

December 12, 2012 – the day that’s fated to be the ‘end of the world’. Humbug? Whatever your opinion on the Mayan prophecies, there are more important causes for concern this year that should get you brooding – particularly in the world of cybercrime. So let’s take a look at a few predictions which are […]

Continue reading

4 Web Security Threats to Look Out For

Is your network sufficiently protected from web security threats? Have you been lulled into a false sense of security? Hackers are changing their habits and using new methods which are web-based, dynamic in their nature and hidden in otherwise legitimate sites. The end-user remains the weakest link in web security as malware authors exploit this […]

Continue reading