Earlier this year, news broke that a malware strain named VPNFilter was infecting hundreds of thousands of devices. If you didn’t act then, now’s the time. Security experts have updated their threat assessment and its much worse than they originally
Read moreTNP Blog
SMB routers targeted by VPNFilter malware
The healthcare industry is unique in that the biggest data security threat comes from insider breaches.The main reason for these unauthorized hacks is financial gain. So how can healthcare organizations protect themselves against insider threats?
Read moreHackers hijack PCs to steal cryptocurrency
There’s a new cyberattack in town, and it’s out to get your Bitcoins. Cryptojacking has grown in popularity over the past few months mainly because of the increasing value of cryptocurrency. So if you notice your computer slowing down, hackers may
Read moreVirtual DR for ransomware protection
The massive success of ransomware like WannaCry and Petya have spurred other cybercriminals to develop their own ransomware and sell it on the black market. This means we can expect more ransomware attacks in the future. To prepare your business,
Read moreBeware of what you save in web browsers
Passwords are a double-edged sword. If you make them too simple, they’ll be easy to guess; if you make them too complex, they’ll be impossible to remember. One solution is to create an uncrackable password and save it to your browser. Unfortunately,
Read more2017’s most valuable IT solutions
It’s the perfect time of year to evaluate last year’s technology investments and make adjustments for the year to come. Whether 2017 left you with extra cash in your pocket or desperate for a better way to get work done, here’s a roundup of the best
Read moreVPNs: Why you need them
Installing powerful antivirus software and setting strong passwords are no longer considered the bare minimum in cybersecurity. With hackers, government agencies, and ISPs constantly monitoring networks and your online habits, hopping onto a Virtual
Read moreEquifax sheds light on incident response
What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident
Read moreIt’s time to redefine the word “hacker”
What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of
Read more