Signs of a Ransomware Attack: What to Look For

Signs of a Ransomware Attack: What to Look For

Think your computer has been infected with ransomware? Research shows that nearly 2 million ransomware attacks occur each day. While some of these attacks target Fortune 500 companies and other large enterprises, others target small businesses. Small businesses are...
6 Facts About the Creeper Computer Virus

6 Facts About the Creeper Computer Virus

Of all the different forms of malware, computer viruses rank as one of the most common. They are surpassed only by Trojans, in fact. Statistics show that roughly 64% of all malware infections on Windows computers involve trojans and 15% of all malware infections on...
5 Cybersecurity Tips for Medical Practices

5 Cybersecurity Tips for Medical Practices

Medical practices in the United States and across the globe are increasingly falling victim to cyber attacks. These malicious intrusions often target medical IT systems, aiming to pilfer patient data which can later be sold on the illicit market to the highest bidder....
Understanding Privilege Escalation: What You Should Know

Understanding Privilege Escalation: What You Should Know

Cybersecurity encompasses hundreds of concepts. While you might be familiar with some of these concepts privilege escalation is a related concept that often goes unnoticed. Nonetheless, it can pose a serious risk to your business and its information technology (IT)...
Goodware vs Grayway vs Malware: What’s the Difference?

Goodware vs Grayway vs Malware: What’s the Difference?

Do you know the difference between goodware, grayware and malware? Most software products fall under one of these three categories. Whether you’re downloading software for personal or commercial use, you should consider its classification. As you may already...