How to prepare MSPs for advanced phishing without wearing out IT staff

Cybercriminals leverage AceCryptor and Rescoms (RAT) to upgrade spam phishing messages difficult to recognize by both humans and machines. To defend, MSPs automate protection. When cybersecurity experts and vendors describe phishing attacks, they usually split them into two big groups. The first group consists of spam campaigns targeting a broad general audience with simple fraudulent messages. … More How to prepare MSPs for advanced phishing without wearing out IT staff

Even legitimate websites can become traps, and small/home offices need to be prepared

One’s personal digital life may be a threat to business. Small offices and home offices need proper prevention.  Heads of small or home offices most likely know how difficult it is to set boundaries between work and their personal lives. One minute you are doing taxes, and the next, you are browsing the internet looking … More Even legitimate websites can become traps, and small/home offices need to be prepared

Apple notifies users in 92 countries about mercenary spyware attacks

Apple has sent a new batch of threat notifications to users in 92 countries who may have been targeted by mercenary spyware attacks, according to several media reports. According to The Record*, the alerts were sent on Wednesday, warning users that attackers tried to remotely compromise their iPhones. On the same day, Apple also updated … More Apple notifies users in 92 countries about mercenary spyware attacks

Beyond fun and games: Exploring privacy risks in children’s apps

Should children’s apps come with ‘warning labels’? Here’s how to make sure your children’s digital playgrounds are safe places to play and learn. Our children spend more time on their phones than ever. Some 80% of European 9-16-year-olds access the internet from their phones every day. In the UK, 91% of children have a mobile phone by the age of 11. … More Beyond fun and games: Exploring privacy risks in children’s apps

Set and protect. A cybersecurity road map for small and home offices

In the evolving world of cyberthreats, small and home offices share a single need: a reliable security solution. If you’re leading a small office, you are likely no stranger to working 12 hours a day. It might even feel like 24/7, doing taxes, communicating with clients, and marketing your business on social media platforms. You … More Set and protect. A cybersecurity road map for small and home offices