Monthly Archives: June 2015

CLEF Two-Factor authentication from the Future

CLEF is another must have Security tool check it out.

By |June 29th, 2015|IT Solutions|Comments Off on CLEF Two-Factor authentication from the Future

Two major techniques that Cyber Criminals use

Two major techniques that cyber criminals commonly use to infect people on the web.

By |June 22nd, 2015|Security|Comments Off on Two major techniques that Cyber Criminals use

See a Mac malware attack and learn how to avoid falling victim

By |June 22nd, 2015|IT Solutions|Comments Off on See a Mac malware attack and learn how to avoid falling victim

Cloud Computing – what you need to know.

Cloud computing’s biggest benefit is that it makes enterprise-quality technology affordable for small businesses. It lets them compete at previously unattainable levels. In fact, it’s now possible to completely run your small business in the cloud.

However, not everyone is on board with this idea. With so many differing opinions, how can you possibly decide […]

By |June 12th, 2015|Cloud Solutions|Comments Off on Cloud Computing – what you need to know.

Ransomeware creator apologizes

Last week, a new strain of ransomeware called Locker was activated after having been sitting silently on infected PCs. Security firm KnowBe4 called Locker a “sleeper” campaign that, when the malware’s creator “woke it up,” encrypted the infected devices’ files and charged roughly $24 in exchange for the decryption keys.

This week, an internet user claiming […]

By |June 5th, 2015|IT Solutions|Comments Off on Ransomeware creator apologizes