TeslaCrypt: A New Version of Ransomware By now, you’ve all heard of ransomware viruses which encrypt your data, and demand a ransom paid in BitCoin in order to decrypt. This week, we’ve seen our first iteration of this new virus,
Content Control – Why Limiting Internet Browsing is a Good Idea
By Dan Gospe Limiting Internet Browsing through Content Control Many businesses are choosing to limit internet browsing by its employees, as browsing can serve as a distraction and impact productivity. However, there is yet another reason to implement content control
How the Cryptowall Virus is Installed through Malvertisements
The Cryptowall Virus is spreading despite antivirus protections 2014 has become the Year of Ransomware, as the Cryptowall virus alone has already infected over half a million PCs since its introduction onto the scene. In order to protect your own PC, it’s
Data Security – Roadmap to Lockdown
Roadmap to Data Security Compliance By Dan Gospe Many dental practices have been using electronic records long before data security compliance regulations came into effect. Fundamental changes to the way your practice handles data security compliance could be necessary to
Virus Protection – Security Tips and FAQs
It takes more than the best antivirus software to implement full virus protection The most common question I’ve gotten from a client with an infected PC is this: “How did I get a virus, when I have the best virus protection installed
What is the Best Antivirus? BitDefender Scores the Highest on the Test
Test Results are in that Answer the Question: “What is the Best Antivirus Software?” The AV-Test Institute has been conducting antivirus comparisons and reviews for over 15 years. By using their documented method for comparison, the institute gives numeric ranks to
Privacy and Data Security – The Frontlines
We have entered a “Digital Age”, where our personal data is being collected and analyzed at astonishing rates. From commerce, government, medical, or even basic internet usage, our protection of privacy is no longer a given. What are the Risks?
CryptoWall: Identification and Removal of the Virus
CryptoWall: Identification and Removal of the Virus Ransomware viruses such as CryptoLocker and CryptoWall work by silently encrypting your important files. Per the virus, the infected user must pay the criminals in order to retrieve the encryption key. By using
Making Strong Passwords, and How to Remember Them
Everybody has heard it all before. Never use the same password across multiple sites. Give your passwords numbers, letters, symbols, and all kinds of other tricks that make them hard to break. The problem, is this day and age everybody
5 Tips to Protect Your Business Data
Threats to your data security can arise from both outside and inside your organization, and can occur through broad-targeted bot attacks as well as direct, malevolent activity from ex-employees, disgruntled customers, or hackers. Protecting your financial data and your clients’