John Wheeler December 18, 2020 0 Comments

Some of the most high-profile ransomware cases in recent memory include the WannaCry and Petya outbreaks in 2017, which infected hundreds of thousands of Windows PCs around the world. However, ransomware such as EvilQuest target Mac computers

John Wheeler November 17, 2020 0 Comments

With the prevalence of cyberattacks on companies of all sizes these days, businesses cannot afford to relegate cybersecurity to the bottom of their budget priorities. When it comes to cybersecurity, even small businesses should partner with a

John Wheeler October 15, 2020 0 Comments

Over the years, Microsoft has built a reputation as a provider of powerful and intuitive tools that enhance efficiency and productivity. The company is also continuously taking steps to protect their users from today’s top cyberthreats. A

Remote work policies have become a necessity not just because of the current coronavirus crisis, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s benefits, it leaves you and

John Wheeler February 21, 2020 0 Comments

In a vishing scam, scammers may pretend to be a bank representative, a government official, or any type of legitimate entity requesting confidential information via Voice over Internet Protocol (VoIP) platforms. With expanding avenues of cyberattacks, remaining

John Wheeler November 20, 2019 0 Comments

Although a majority of ransomware attacks usually target Windows computers, this doesn’t mean Mac users are completely safe. Ransomware attacks for Macs are a rarity, but they do occur. So how can you prevent ransomware from infecting

While cybercriminals create new malware strains or look for software vulnerabilities to exploit, other criminal minds happily rely on an old, yet effective, trick: phishing scams. Such scams persist because people still fall for fraudulent email that

John Wheeler February 28, 2019 0 Comments

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts