Recent Posts

Categories

See all

Archives

See all

TNP Blog

Understand these 4 types of hackers

Why do hackers attack? Is it for money, notoriety, or political reasons? Many business owners never ask these questions, and instead only think about the means of how a cyber attack takes place. But knowing the motive behind a hacker’s attack can

Read more

The security risks of virtualization

While virtualization security is not often talked about, it is nevertheless important. Like all technology, securing your virtualized infrastructure is vital to the success of your business. So what are some of the security risks posed by

Read more

Tips to monitor employee activities online

When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of

Read more

4 things you should know about the cloud

Cloud computing has proven to be a cost-effective necessity for small businesses. Owners can now breathe a sigh of relief as website hosting, email services implementation and online file storage have become easier thanks to the cloud. However,

Read more

Risks financial firms face

TTP’s stands for threats and tactics, techniques and procedures, the number of which has been gradually increasing since 2015. The financial services sector has long been the target for cyber criminals, where they apply a myriad of techniques

Read more

Can Your Business Survive A Disaster?

Disasters. They do happen -- it’s only a matter of ‘when’. While most businesses acknowledge it, surveys show that only one in four companies worldwide have adequate protection in the event of a major disruption. We’re not talking about insurance

Read more

The true story of an SMB attacked by hackers

When big companies like Dropbox or Ashley Madison are hacked, the whole world hears about it. But how often do you hear about cyber attacks on the SMBs of the world? Probably not often, or never. Well, today, that’s all about to change. The NY Times

Read more

Chimera ransomware’s scary tactics

The threat of being infected by malicious software is part and parcel of spending time on the internet, and no sooner have the antivirus and security software programs released an update or new patch than cyber criminals are scrambling for ways to

Read more

Twitter alerts users to cyber attacks

Something known as “state-sponsored cyber attacks” may not be something you have heard of until now. But with both Facebook and Google viewing the problem as serious enough to warn their users about, it seems this is an issue that could be here to

Read more

How Google overcomes secure browsing issues

It’s safe to say that malware attacks, phishing scams, and social media engineering practices are going nowhere fast. That means that, whether you are a home user or the owner or manager of a small or medium-sized business, if you choose to ignore

Read more

Recent Posts

Categories

See all

Archives

See all