SEO Poisoning: Does It Affect Network Security?

February 15, 2022By Andrew RadfordCyber Security, Technology

Google and other search engines keep information flowing through the internet, returning billions of search results every day. Everyone uses search engines for work, research, and entertainment, creating a fertile hunting ground for cybercriminals. SEO Poisoning is a growing trend that business owners need to be aware of. In addition to email phishing, cybercriminals can … Read More

6 Methods Hackers Use to Bypass Two-Factor Authentication

January 31, 2022By Andrew RadfordCyber Security, Endpoint Security, Technology

Current best practices for security include Two-Factor Authentication (2FA) for protecting sensitive accounts. For both business and personal accounts, the additional protection of requiring a code delivered via phone or email provides an extra layer of defence against cybercriminals.  2FA also includes other forms of authentication such as biometrics and physical tokens, for example. While … Read More

Ransomware Trends For 2021 Roundup

January 5, 2022By Andrew RadfordCyber Security, Ransomware, Technology

While ransomware needs no introduction as a cybersecurity threat, 2021 demonstrated that cybercriminals could disrupt anyone from individuals, the private sector, and even governments. In 2021, cyberattacks hitting individuals, corporations and supply chains are on the rise. Ransomware attacks affected the ability of millions from accessing health care, fuel, and even the purchase of groceries. … Read More

Firewall as a Service (FWaaS): A Complete Guide

October 27, 2021By Andrew RadfordCyber Security, Ransomware, Technology

Firewall as a Service (FWaaS) is an evolutionary way of providing firewall and network security as a cloud service. Traditionally, businesses have deployed Next-Generation Firewalls (NGFW) as appliances, needing to support the entire lifecycle of those appliances, including maintenance, upgrades, security patches, and hardware failure. FWaaS differs from the physical NGFW design model in that … Read More

EPP vs EDR: Which Provides Best Protection?

October 25, 2021By Andrew RadfordCyber Security, Endpoint Security, Technology

The endpoints, or outer perimeters of your network, have no doubt multiplied over the last two or three years as your mobile workforce has expanded. Providing security for these endpoints has become a challenge due to these ever-increasing numbers requiring both security monitoring and updates. While every security vendor touts its own proprietary technology, the … Read More

11 Common Social Engineering Techniques Revealed

August 30, 2021By Andrew RadfordCyber Security

Cybercriminals use several common social engineering techniques to manipulate an individual to divulge confidential information or provide system access. Although some of these techniques appear quite simple and easy to identify, others are far more complex and sophisticated. The challenge for businesses is that it only takes one moment’s lack of concentration by a single … Read More

4 Popular Security Suites For Small Businesses

June 30, 2021By Andrew RadfordCyber Security

The threat landscape is ever-changing, and so your security software must keep up. The best security suites for small businesses offers a plethora of different features to keep your business safe from a wide range of cyberattacks. It’s no longer just about virus defence. Ransomware is now considered a significant threat, with many attacks against … Read More

Ransomware as a Service: Beginning of The End?

June 27, 2021By Andrew RadfordCyber Security

2020 was a lucrative year for cybercriminals, who thrived while businesses struggled to adapt to new working conditions and remote configurations. Hackers were able to attack larger targets and demand more money using ransomware. We have seen the rise of Ransomware-as-a-Service (RaaS), which flourishes in underground forums. Ransomware operations are becoming an all-too-successful enterprise on … Read More