Recent Posts

Categories

See all

Archives

See all

TNP Blog

Cyber-crime and social engineering

For as long as there have been cybercriminals, there have been social engineers, or people who use tricks and scams to force other people to volunteer sensitive information. There are several ways to use social engineering to acquire valuable

Read more

9 cybersecurity terms everyone must know

Everyone, from doctors to lawyers, needs to continue learning to stay ahead of the times. Business owners might have it worst of all, oftentimes needing to stay on top of several industries to keep their company running. Keep reading for a refresher

Read more

New security patches for VMware machines

While virtualization still has a host of security advantages over its localized counterparts, it isn’t exempt from the attention of cyber attackers. Most recently, one of the industry’s leading software vendors, VMware, was forced to release a patch

Read more

Benefits of using Skype for Business

For businesses, it’s never enough to rely on just one asset to succeed, especially when there are better options out there to explore. This is where Skype for Business comes in. Skype for Business is more tailor-made for companies, and it’s hard to

Read more

Hybrid clouds give flexibility to SMBs

Most people will tell you that clouds can be only be found in the sky. But in the IT world, clouds are more grounded: the latest of which are a combination of private clouds and public clouds, appropriately dubbed “hybrid clouds.” This innovation

Read more

WordPress 4.5.3 patches security vulnerabilities

WordPress is an amazing open source platform that is favored by individuals and business users worldwide due to its ease of use, simplicity and flexibility. However, given that it is the most widely used content management system, it is also the

Read more

Game Over: NBA team losses valuable data

Good cyber security, much like the best NBA defenses, must be strong and able to stop threats from every which way. For the Milwaukee Bucks, their on-court and cyber security defense could both use a little practice. Yahoo! Sports reported that the

Read more

Ransomware to begin self-propagation

One of the biggest fears security experts have may be coming true: self-replicating ransomware. Viruses that have the ability to copy and spread themselves to new systems are nothing new, but until now ransomware attacks have been targeted

Read more

5 tricks for thwarting VoIP threats

The VoIP market continues to grow and doesn’t show any signs of stopping. As its use becomes more widespread, so too do the security threats against it. Although these type of attacks haven’t received as much media attention as ransomware and

Read more

Are your site’s images hiding an attack?

As more and more content management services are released to aid SMBs in online marketing, security risks also increase. One such helper is the image processing service ImageMagick. And while it has proven useful to countless businesses, it is now

Read more

Recent Posts

Categories

See all

Archives

See all