Category: Managed IT Services

13 articles

Darkweb

Cyber criminals organize themselves on the Dark Web, planning and exchanging tools and information that enable and propel attacks against businesses of all sizes. But you can get the upper hand and understand if there are activities being plotted against your business by getting informed about the leading indicators of an impending attack: leaked credentials. […]

Cyber Security

Some businesses see cybersecurity as a cost center, instead of an investment. 1. The ransomware risk is rising for SMBs With more than 70 percent of ransomware attacks now targeting SMBs, protecting against ransomware is one of the biggest challenges that SMBs currently face. What is needed is create a ransomware response plan that includes detection, cause […]

Winning Cybersecurity

Managed Service Providers (MSP) In the past few years, the threat landscape has changed dramatically, and the traditional solutions will not be enough to defend your business. However, partnering with a Managed Services Provider (MSP) that offers IT security can bolster your cybersecurity defenses with robust security technology, monitoring, detection, and training. Partnering with an […]

Search (2)

The Top Browser Threats When end users venture out onto the Internet, it’s easy to get tangled up in the vast web of threats lurking on many website pages. Some of them are readily apparent, but others are well hidden.   Malvertising—a form of malicious code that distributes malware through online advertising—can be hidden within […]

Mobile

Mobile Threats Jeopardizing Company Data Mobile security is increasingly becoming a big concern as more and more companies adopt Bring Your Own Device (BYOD) environments, which allow end users to connect to corporate networks through their own (often multiple) devices. Even in cases where a business does not offer BYOD, end users often find a […]

Locks

Low Security Account Credentials Although it should be common sense, employees need to avoid the use of passwords that are easy for hackers to guess. Among the top ten worst passwords according to Splashdata, are those that use a series of numbers in numerical order, such as <123456>. The names of popular sports such as […]

Email

Email Threats Social Engineering Inboxes and VoiceMail Social engineering is non-technical, malicious activity that exploits human interactions to obtain information about internal processes, configuration and technical security policies in order to gain access to secure devices and networks. Such attacks are typically carried out when cyber criminals pose as credible, trusted authorities to convince their […]

6 Security Flaws In This Photo

Chapter 1: Physical Security Precautions Keep a Clean Desk It makes sense and sounds so simple, but keeping a clean desk is often overlooked when talking about cyber security. It’s also the perfect place to start the security discussion with employees. Employees that keep a cluttered desk tend to leave USB drives and smartphones out […]

Activist Anonymous Ransomware Attack

A complete endpoint security solution for your business’ needs. Backed by a US$1m ransomware warranty. Is your business looking for threat protection, remediation, incident response and the benefits of a security operations center (SOC)? Cylon for Endpoint Security monitors your IT environment, detecting malicious threats and quickly remediating the attack, with 24/7 support from our […]

Cybersecurity Tips

The Complete Guide to Secure Behavior Online and in the Office. The Need to Educate Employees on Cybersecurity. When developing cybersecurity strategies, businesses typically focus on protecting their infrastructure perimeter and endpoints, since that’s where criminals usually gain access and wreak havoc. But what happens when a threat bypasses perimeter defenses and targets an employee—in […]

Office Security

5 Tips for a More Secure Office When thinking about securing your business from cyber threats, the mind quickly turns to phishing, hacks and viruses, but there are many security threats in and around the office that can expose your business to a host of threats and cybersecurity issues. In conjunction with a solid cybersecurity […]

City Power confirmed on Twitter this morning that it has been hit by a ransomware attack which compromised its web server, databases, applications, and network. See how, with our SOC (Security Operations Center) you can prevent Ransomware attacks on your business. https://devweb.cylonconsulting.com/wp-content/uploads/2019/06/Understanding-the-SOC.mp4#t=2 To Learn more: Click here To read the full article by mybroadband.co.za  Click […]

Big data

Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it’s probably impossible to imagine your business without IT. Today, computing technology plays a vital role in the way you serve, work with, and communicate to your clients. Thanks to advances that have […]

← All Posts