9 Cyber Security Issues That Could Be Leaving Your Data Vulnerable To Attacks

Cyber Security
Cyber Security

As our reliance on technology grows, so does our need for improved cybersecurity. With so much of our personal information stored in our devices, simply browsing online or enabling certain settings on your smartphone may be leaving you vulnerable to hackers.

Of course, most users aren't well-versed in cyber security. However, you don't have to be a tech expert to ensure your data is protected. Being aware of these issues and making a few easy changes to how you use your devices are great first steps toward better protection.

To help, we asked the leaders at the Forbes Technology Council to give us their tips on what issues to look out for so we can stay safe online and off.

 

Read more at Fores Technology Council.

Computer Attack Knocks Weather Channel Off the Air

The Weather Channel knocked off air by 'malicious software attack

WeatherChannel

The Weather Channel was knocked off the air Thursday morning by what it said was a malicious software attack on the network.

The network's morning show, "AMHQ," which had been due to start at 6 a.m. ET, was unable to go on air. Instead viewers saw taped programming, "Heavy Rescue: 401." The AMHQ show returned to the air at 7:39 a.m. ET with a commercial break, and at 7:43 a.m., its anchors announced the reason for their absence.

Cyber Security Today: More weak passwords, a key to security and compromised web sites

Cyber Security

More weak passwords, a key to security and compromised web sites

Welcome to Cyber Security Today. It’s Monday April 15th. I’m Howard Solomon, contributing reporter on cyber security for ITWorldCanda.com. To hear the podcast click on the arrow below:

Cyber Security

Trend Micro has discovered a new piece of malware that tries to install a hidden program on your computer to mine for cryptocurrency. So it secretly uses your computing power to benefit a criminal. The best ways for you to avoid being infected are to make sure all your software is regularly updated, be careful about the links you click on in email, the web sites you go to, and use strong, original passwords for logins. What I want to point out is the attack starts with the malware automatically trying to log in to your computer using a list of common, weak passwords. Here’s a few on the list, passwords you must avoid: 123456; password; football; welcome; login; hello; admin; abc123 and keyboard letters in a row, like qwerty. Now, if trying these and other commonly-used stolen passwords don’t work the malware tries more sophisticated login techniques. But if you make it easy for criminals they’ll take advantage of you. So instead of passwords create easier to remember passphrases. As I’ve said before, use a password manager and, where possible, two-factor authentication.

 

Read more from IT World Canada

Top College Student Gadgets For 2019

Computer Gadgets

Top College Student Gadgets For 2019

Computer Gadgets

Once students are done with high school, most of them feel incredibly excited.  For most, the high school experience is too limited, and it is time to enjoy some learning freedom. A great way to take advantage of this freedom is to ensure you use technology to your benefits. Forget the summer hijinks and heavy backpacks with books. There are cool technology gadgets that can be used to ensure that you make the most of your education. If you have found a job after completing your high school education, you will enjoy learning that most of the things every college student needs are affordable and will last for years. This article reviews the top 10 electronic gadgets that students require to make their college lives better.

 

Read more from Tech Shout.

RingCentral 2018 Winner: Hosted PBX Customer Satisfaction

RingCentral Phone System

RingCentral PartnerEastern Management Group customer study pits vendors of hosted PBX against premises PBX systems.

BX platforms have come full circle, and everyone knows it. Declining premises PBX sales – in 2017, 2018, and now 2019 -- rewind us more than a half-century to 1961, to the age of the Corvair Monza and the Plymouth Fury. We are looking back on something that today shares Centrex DNA, a first hosted PBX platform that once siphoned-off premises PBX sales. Well, to be fair, hosted PBXs are still siphoning off premises PBX sales, but at a faster rate, with superior technology, and better selling to attract new customers.

Today, it’s Centrex redux; and the 2019 muscle car is the hosted PBX. The best hosted PBX, according to Eastern Management Group’s customer satisfaction research is RingCentral. RingCentral is in the catbird seat in a massive hosted PBX market that according to our research accounts for 18% of all PBX sales.

Eastern Management Group recently performed a PBX customer satisfaction study, collecting data from thousands of customers who judged their PBX provider on 10 separate customer satisfaction measurements (see table below). While the study and report -- “2018 Premises and Hosted PBX Customer Satisfaction” -- present numerical data on the 16 hosted PBX and premises PBX providers, today I will address RingCentral, the 2018 hosted PBX customer satisfaction winner.

10 New malware attacks to be on the lookout for in 2019- and what you can do to protect your data!

malware attacks
malware attacks

Just when you thought you had all of your defenses in place when fighting Malware, Cyber Attacks, and Ransomware… think again! Cybercriminals are busy crafting new methods of attacks that are ready to take your data for prey and pounce on your personal information. Here are 10 new sneaky attacks to be on the look-out for in the new year!

  1. Rivaling governments and geopolitical cyber-warfare funding the efforts of cybercriminal gangs to create chaos, steal intellectual property, and profit from fraud and extortion by breaching personal data.
  2. New variants of ransomware (including doxware, which threatens to publish sensitive data like browsing histories unless a ransom is paid)
  3. Much more widespread use of cryptojacking (stealing computing resources to mine cryptocurrency without sharing the profits)
  4. More distributed denial-of-service (DDoS) attacks on critical servers and networks, abetted by the conscription of armies of Internet-of-Things (IoT) devices
  5. Increasing use of fileless malware (which never becomes disk-resident, only loads directly into memory, and thus evades many signature-based endpoint anti-malware measures)
  6. More synergistic attacks (in which multiple malware attacks are injected onto a system and the poorest-defended one activated using AI and ML to improve attack techniques
  7. Continued reliance on phishing as the most effective attack vector for malware, with more sophisticated attacks targeted at higher-value individuals.
  8. Increasingly target cloud services and edge computing environments with malware attacks
  9. Enslave legions of IoT devices for use in DDoS and cryptojacking attacks
  10. Exploit the new attack surfaces and rich data targets presented by 5G networks and applications.

Read More From Lifeboat Distribution

Partnership with Symantec

Symantec Registered Partner
Symantec Registered Partner

Why did Easy IT Support partner with Symantec? Because Symantec is a enterprise grade security for the masses. Cyber safety for consumers!

Cyber Security Exsperts

A patchwork of stand-alone security products from multiple vendors is simply too expensive, too complex, and, even worse, it’s proven to be ineffective.

As the world’s leading cyber security company, we deliver a better way forward:
it’s called Integrated Cyber Defense.

An open platform that seamlessly combines security solutions from Symantec and our technology partners into a single framework across devices, networks, cloud, and datacenter infrastructure.

Offering unparalleled

  • Threat Prevention
  • Detection
  • Incident Response
  • Managed Security Services

Integrated to reduce complexity for ease of use and lower costs.

SCAM THREAT: Computer ‘virus’ trick continues to target Spain

Computer Virus

SCAM THREAT: Computer ‘virus’ trick continues to target Spain

Computer Virus

FRAUDSTERS: Microsoft has confirmed this scam has been reported in 16 different countries.

A TELEPHONE scam by con artists purporting to be computer technicians continues to pose a threat in Spain.

The con, in which fraudsters call pretending to be from Microsoft before bullying their victims into allowing them access to their computer, has reportedly been ongoing for 16 years.

Computer-users are being warned scammers will claim a home computer has been infected with a virus before telling them to follow the caller’s instructions and click on a link they have send.

Read more from Euro Weekly News

RingCentral

RingCentral

RingCentral Christmas Ideas?

Are you looking to get your whole company a Christmas present? How about a new phone system by RingCentral?  Call us today for more information. We can have you up and running by the start of the New Year. #CloudBasePhoneSystem #RingCentral

RingCentral