Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can
Read moreTNP Blog
Understand these 4 types of hackers
The security risks of virtualization
While virtualization security is not often talked about, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to the success of your business. So what are some of the security risks posed by
Read moreTips to monitor employee activities online
When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of
Read more4 things you should know about the cloud
Cloud computing has proven to be a cost-effective necessity for small businesses. Owners can now breathe a sigh of relief as website hosting, email services implementation and online file storage have become easier thanks to the cloud. However,
Read moreTTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques
Read moreDisasters. They do happen -- it’s only a matter of ‘when’. While most businesses acknowledge it, surveys show that only one in four companies worldwide have adequate protection in the event of a major disruption. We’re not talking about insurance
Read moreThe true story of an SMB attacked by hackers
When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times
Read moreChimera ransomware’s scary tactics
The threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to
Read moreTwitter alerts users to cyber attacks
Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to
Read moreHow Google overcomes secure browsing issues
It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore
Read more