The Importance of Security Audits and Assessments

The cyber world is ripe with risk and threats and organizations go to great lengths, and cost, to prevent these threats from becoming an attack. To prevent cybercrime, it’s imperative to have an effective cyber security strategy in place. However, to determine the best plan for your organization you have to start from the beginning. What does this mean? Performing…

B0r0nt0K Ransomware Threatens Linux Servers – Users Beware

A new ransomware cryptovirus called "B0r0nt0K" has been putting Linux and possibly Windows Web servers at risk of encrypting all of the infected domain's files. The new ransomware threat and the ransom of 20 bitcoins (about US$75,000) first came to light last week, based on a post on Bleeping Computer's user forum. A client's website had all its files encrypted…

How IT Can Defend Against Ransomware

Paying your way out of a ransomware attack can be a viable option, but this route is not only expensive, it's dangerous. A better strategy is to build a successful defence and response plan. Here's how. We all know ransomware is one of the most destructive malware variants out there. You're talking about clicking on the wrong link and having…

Jump Into Office 365 With Both Feet – Or Walk Away?

Businesses of all shapes and sizes are moving towards Office 365, primarily driven by their IT departments. The technology reasons for the shift are clear: the cloud makes many infrastructure problems go away, tools can now be accessed from anywhere, and the capabilities of the products are extraordinary. With a whole new ocean of possibilities ahead, what’s odd is that…