Best storm preparation is communication

There is nothing worse for a company and its customers than being forced to close because of inclement weather. And with winter almost upon us once again, now is a good time to make sure your business continuity plan is prepared for anything and everything mother nature is looking to throw your way. By communicating […]


Now days it’s getting harder to protect ourselves from hackers determined to steal our passwords, data and wreck havoc on our lives and businesses.

One of the biggest threats around is Ransomware.  Ransomeware will encrypt ALL the data and pictures on your hard drive and network shared drives.

U.S. Tells Users To Stop Using Internet Explorer For Now

The Department of Homeland Security is warning Americans to stop using the Web browser Internet Explorer because it has a bug that could allow hackers to install malicious software without the user knowing it.

The vulnerability, the United States Computer Readiness Team says, has already been exploited in the wild.

BEWARE: Fake Caller from “Microsoft”

A number of people have already been victimized by a new scam in which fraudsters pose as callers from Microsoft. They insist that your system has a virus or is running too slowly, and have you not only pay for a bogus
service, but steal your credit information as well.

Microsoft warns of telephone phishing scam

(Note: While this article is dated June 2011 there is currently a huge resurgence of telephone phishing)

On June 16, 2011, Microsoft released the results of an independent survey conducted by Dynamic Markets, Ltd., commissioned by Microsoft Trustworthy Computing, regarding an increasingly popular phone scam criminals are using to target victims.

Small Firms Beware – ZeuS Trojan Can Steal Your Money

The days are gone when the effects of a Trojan or virus attack are limited to your computer or your network. The threat commonly called ZeuS or ZBot is just one tool of an international cybercrime ring with one goal – to steal your money. You can pick up the ZeuS infection through a drive-by download from a malicious Web site, from a perfectly valid site that's been hacked or by simply clicking on a link in an innocent-looking e-mail such as a false LinkedIn connection request.