You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com...right? Because if you’re not, you could end up exposing your computer or smartphone to a host of malware. The newest phishing attack strategy is the worst of all, and can catch even the most astute users off guard.
Sly phishing attack catching users off guard
Wikileaks’ charges of government spying

Staving off malicious cyber attackers is already a herculean task, so the last thing you need is to feel exposed from a totally new angle. That’s how many felt after Wikileaks’ accusations that the US government was spying on its citizens. However, the truth is a lot different from what the headlines would have you believe.
No Ransom: a place for free decryption
Mac ransomware and how to defeat it
Why your business needs a hardware firewall

Cybersecurity is one of the final bastions of hardware superiority. More and more IT solutions are being hosted in the cloud, and business owners are being told that software is all they need to get the job done, which is half true. When it comes to perimeter security you definitely need a hardware firewall, with a little something extra.
Fileless malware: who are the targets?
5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise.
Apple’s new year comes with new malware

We love Mac computers as much as anyone does, but even we have to admit the notion of superior cybersecurity can be a bit overblown. Malware still finds its way onto Apple devices, and the only remedy is preparedness. Take a minute to brush up on the first Apple malware of 2017 before it puts a damper on your new year.