Here are some ransomware decryptor sites you should keep handy

Ransomware is on the rise, but falling victim to one is not the end of the world. You can try some of these ransomware decryptors and maybe one of them will work. These are especially useful against automated “zombie” ransomware types.

The state of ransomware in 2021 so far

Businesses need to deal with ransomware both from outside and within.

Boost your cybersecurity with security audits

Are your organization’s cyber defenses enough to protect it from a cyberattack? Unfortunately, just incorporating the latest antimalware software or firewall to your system won't guarantee your company's safety. Conducting a security audit will give you a complete picture of your company’s data integrity, giving you a greater chance of successfully meeting your cybersecurity goals.

Better internet security: Easy as 1, 2, 3

The internet is not such a bad place to be in — for as long as website owners do their share in keeping it safe for their visitors. Here are three tips to do exactly just that.

Tip 1: Use HTTPS

Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security for its users.

Signs you have weak enterprise security

As cyberthreats become more sophisticated, many businesses need to prioritize cybersecurity more than ever. But are you sure that your security measures are keeping your enterprise IT assets safe? Here are five signs that they may not be effective.

Open wireless networks

With just one main internet line and a couple of wireless routers, an entire office can get online.

Don’t be a victim of juice jacking

Smartphones have become an indispensable tool for most of us. We use them for a wide range of activities, from gaming to checking social media to accessing work apps. Because of heavy use, our smartphones may sometimes run out of battery. When that happens and you’re out in public with no access to your charger, using public charging kiosks to bring your phone back to life can seem like a good idea — but it’s not.

Two excellent ways to verify user identity

A secure login process is an excellent way to protect your business from cybercriminals.

When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Learn the difference between the two so you can have a better appreciation of your cybersecurity options.

Cybersecurity Breaches and Small Business: A Matter of If or When?

By Vince Tinnirello

Cybersecurity breaches are a daily news item these days. The most recent breach of Equifax has affected millions of Americans. You can see if you were personally affected by this breach by going here:

Check with Equifax

While we’ve almost become immune to the hacks of big businesses such as Target, Home Depot, and Equifax, little attention is being paid to cybersecurity breaches in small business.