News & Media

Maybe, Probably Phishing – LastPass Compromise

LastPass has let customers know that their development environment was compromised by accessing it through a single compromised developer account. They have ensured customers that while the hackers took portions of the source code – no passwords were compromised. We are not saying it was a successful phish – but it looks like it might…

Read More...

Tech Tip Tuesday – Update those Apple Devices!

It’s that time again – time to update your Apple devices because the bad guys found a way in and found a way to exploit apple devices. Thankfully – the updates are easy – and relatively painless. Here’s how to download the iOS and iPadOS 15.6.1 update. 1. Open Settings. 2. Tap General. 3. Tap Software Update. 4. You’ll be prompted to…

Read More...

We smell a Rat – a BORAT RAT

A new and nasty Remote Access Trojan (RAT) malware has been discovered by Atlanta-based cyber risk intel company – Cyble. The normal RAT will allow bad actors to gain full remote access of infected machines – but this new RAT – BORAT RAT is a triple threat. It provides a dashboard for hackers to not…

Read More...

The Week in Breach: How Fast Can Your Password be Hacked?

Real-Time Service Alerts Are Your Passwords in the Green? Looking at Passwords in 2022 – Hive Systems It’s been two years since (Hive Systems) we first shared our (now famous) password table. (shown above) So it was about time we not only updated it for 2022 but we wanted to walk you through our methodology….

Read More...

The Week in Breach -Ransomware Isn’t the Only Malware Threat Companies Face

  Make sure to add us or contact us for the latest news Real-Time Service Alerts Ransomware Isn’t the Only Malware Threat Companies Face Other Types of Malware Are Surging, Imperiling Businesses While ransomware may get the bulk of the press attention when it comes to cybersecurity, it’s not the only malicious software game in town. Other…

Read More...

The Week in Breach: 3 Phishing Threats Right Under Every Employee’s Nose

Make sure to add us or contact us for the latest news Real-Time Service Alerts These 3 Phishing Threats Lurk Where You Least Expect Them Phishing is the number one data breach risk and a plague on businesses. Every day, employees are inundated with dangerous messages, and some are harder for employees to spot than others, opening their…

Read More...

3 Mobile Phone Security Tips: How to Protect Your Devices 📱

There is no manual that comes with your phone, tablet or laptop that’ll teach you mobile security. But if you follow along with these three tips and tricks for mobile phone security, plus bonus takeaways at the end, you’ll be an IT expert in no time. Basic Phone Security Before you even ask yourself, “Am…

Read More...

Social Media

Make sure to add us or contact us for the latest news

Read More...

The Week in Breach: Security Awareness Fatigue is Real

Make sure to add us or contact us for the latest news Real-Time Service Alerts Selling Your Employees on Security Awareness Training 6 Points to Hammer Home Businesses of every size in every industry are facing more cybersecurity risk and pressure than ever before. Every day, their employees are being inundated with cyberattack threats, and…

Read More...

The Week in Breach: 10 SMB Data Breach Statistics You’ll Want to See

Real-Time Service Alerts These 10 SMB Data Breach Statistics Show What a Dangerous World It Is for Your Data A data breach is a nightmare for any company, and it’s one that more businesses in more industries are having to face today. About 85% of IT professionals foresee a data breach at their organization in the next 12 months. Cybercriminals are…

Read More...

The Week in Breach – Serious New Warning Issued For Apple’s 1.65 Billion iPad, iPhone Users

Make sure to add us or contact us for the latest news Real-Time Service Alerts Gordon Kelly Senior Contributor Consumer Tech iPhone owners are currently facing multiple threats, but Apple’s new CSAM detection system has generated greater fears than even the biggest hacks. And it just got worse. In a shocking new report (via BleepingComputer), a team of researchers at Imperial…

Read More...

IntegraMSP – Ransomware Disaster Recovery Demo

Being able to quickly recover your data and be fully functional after a ransomware attack can make all the difference for your business. We explore how easily we can get you up and running after a disaster – whether man-made or otherwise. Let us help you ensure that you can recover from a catastrophe. Reach…

Read More...