News

60% Of All Hacked Websites Contained At Least One Backdoor
Introduction Most cybercriminals attempting to hack websites simply play a numbers game, using automated scripts to discover weaknesses almost effortlessly. Once they are successful, hackers

3 Crucial Tips to Avoid a Cyber Whaling Attack
Introduction When you hear the term “Cyber Whaling Attack,” maybe your mind goes to Captain Ahab and his dogged pursuit of the giant white whale

Why Cloud Computing Works so Well for Most Businesses
Introduction Cloud computing refers to the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the Internet (“the cloud”) to offer faster

The Most Important IT Security Measure you can Implement for Your Business
Introduction For most of us, phishing emails are almost a daily occurrence in our inbox. In this article you will find out the most important

How to Protect Your Business Servers in a Power Outage
Introduction Over the last several years, news of possible power outages due to increased demand for energy have become increasingly common, leaving many business owners

The Largest Cybersecurity Breaches of 2022
Introduction In 2022, the number of websites affected by cybersecurity attacks grew exponentially. According to Check Point Research (CPR), the number of data breaches reported

3 Steps to Making Your IT Super Secure
Introduction As reported by our gladiators earlier this quarter, ransomware and cyberattacks have been reaching record highs, and it’s important that local businesses act immediately

How Hackers Were Able To Access Uber’s IT Systems (and What You Can Learn From it)
Introduction On September 15th 2022, an 18-year-old hacker penetrated Uber’s systems by accessing the company’s third-party services. It has echoes of the SolarWinds hack of 2019, with

The Three Unbreakable Rules of Business Technology
Introduction Like it or not, technology in business has become one of the driving factors behind many companies. It’s no longer a game of

Keep Company Devices Protected Over the Shopping Season
Introduction November and December are the most active times of year for many when it comes to online shopping. The temptation to use a company

Secutor Gladiator Report: Q4 2022
Written by: Richard Eaton Introduction Ransomware had a peak in the month of October, and our Secutor Gladiators have been on the frontline helping companies

Tips for Setting up Folder Permissions Across Your Organization
Introduction File permissions within your organization are an important topic you need to have a general understanding of. In the event of a data breach,