2022's best place for Cybersecurity Insights and Advice for Everyone

CyberSecurity – SMB

The #1 Cyber Threat Small Businesses are Facing

The #1 Cyber Threat Small Businesses are Facing

Phishing attacks are the most widespread and most damaging threat to small businesses, accounting for 90% of all cyber security breaches.

Do You need to Conduct a Cyber Security Risk Assessment

Do You need to Conduct a Cyber Security Risk Assessment

Small businesses experience cyber security risks in varying forms and sophistication every day. Being complacent about the risks and ignoring the importance of a cybersecurity risk assessment can damage the health of their businesses. 

What is Spear Phishing?

What is Spear Phishing?

Spear phishing is a targeted cyberattack to steal your information. You should be aware of the dangers of this and how to address them.

What is Whaling?

What is Whaling?

Whale phishing is a targeted spear-phishing attack in which cybercriminals impersonate the high-level executives of an organization to send messages to lower-level company administrators in a position to do the acts being requested by the criminals on two things they want most -- money and data.

What is Shoulder Surfing?

What is Shoulder Surfing?

Shoulder surfing is a form of social engineering that enables cybercriminals to gather information just by looking over their victims’ shoulders. The aim of shoulder surfing is to obtain personal data, such as usernames, passwords or personal identification numbers (PINs), bank account numbers or credit card numbers.

What is a Trojan Horse?

What is a Trojan Horse?

Trojan horse computer viruses are malware disguised as or hidden in legitimate software. Hidden from view and ready to attack.

What is a Website Security Certificate?

What is a Website Security Certificate?

A website security certificate is a digital certificate that asserts the identity of a website. It’s a virtual file approved by an industry-trusted third-party called a certificate authority (CA)

What is Hacking?

What is Hacking?

Hacking is an old game in the cyberworld with ever changing players and techniques. It may be done with good intentions or malicious motives. It is growing rapidly because of the proliferation of devices.

What is a Remote Access Trojan (RAT)?

What is a Remote Access Trojan (RAT)?

A remote access Trojan is a software used by hackers to gain unauthorized access and remote control on a user’s computer or mobile device, including mouse and keyboard manipulation. 

What is a zero-day threat?

What is a zero-day threat?

A zero day threat is a security flaw known or unknown to the software vendor which hasn't had a patch made to fix the vulnerability.

What is a Potentially Unwanted Program (PUP)?

What is a Potentially Unwanted Program (PUP)?

PUPs refer to programs, applications and other software downloaded onto computers or mobile devices that may have an adverse impact on user privacy or security. The term “potentially unwanted program” was coined by McAfee to distinguish the program from malware.

What is Encryption?

What is Encryption?

Encryption is the process of scrambling data – text, audio, video into an unreadable form, known as ciphertext, so only authorized resources can decode/access it.

What is DNS Hijacking?

What is DNS Hijacking?

DNS hijacking is no laughing matter. It is a serious security threat that is consuming the cyber world. The critical role of DNS for network security has made a primary target for facilitating mass data theft.

What is Social Engineering?

What is Social Engineering?

Social Engineering in the digital world is the intentional deception and manipulation of victims to cause the release and sharing of confidential information used to commit fraud and other cybercrimes.

What is a VPN?

What is a VPN?

A VPN is a virtual private connection to a VPN host server to hide your identity, address and online activity when using a public Internet connection. It does this by encrypting your data and turning them into “rubbish” so no one can make sense of it even if they get their hands on it.

What is Pharming?

What is Pharming?

Pharming is cybercriminals “slight of hand” cyber attack. Redirecting you to a fake website imitating a legitimate site so they can steal your login info, financial data, and more.

What is Ransomware?

What is Ransomware?

Ransomware is particularly vicious malware that infects your digital device, encrypting your data and then holding you hostage until you pay a ransom.

What is Two Factor Authentication

What is Two Factor Authentication

Two-factor authentication is a security mechanism in which individuals provide two authentication factors to log on to their account. Using a username and a password to log in to an account is in itself a 2FA. So is withdrawing cash from an ATM using your ATM card and a PIN. 

What is a Back Door Threat?

What is a Back Door Threat?

In cybersecurity, a Back Door Threat enables a hacker to gain unauthorized access to a computer or digital device at any time.

What is Phishing?

What is Phishing?

Phishing is a cyberattack that attempts to trick people using email, text messages, phone calls, or even fake websites into giving away sensitive and confidential information.

What is Malware?

What is Malware?

Malware or “malicious software” is a cybersecurity term used to describe software that steals your data, spies on you, damages your devices, and generally causes chaos and destruction.