Quantcast
Channel: Cybersecurity Advice from WebTitan.com
Browsing all 169 articles
Browse latest View live

Benefits of Teaching Hacking Techniques

This article explores the benefits of teaching hacking techniques. Why on earth would I want to do that you may ask? Isn’t that the same as telling someone how to rob a bank? Well, it is, but teaching...

View Article



Network Security Checklist for SMBs

Network Security Checklist for SMBs Our network security checklist for SMBs acknowledges the fact that many small-to-medium sized businesses do not have the resources to dedicate to their network...

View Article

Lack of Cybersecurity Funding? Cost-Effective Solutions for IT Professionals

A chronic lack of cybersecurity funding is a common problem. Network administrators and IT managers alike must learn to deal with a small budget and do more with the money they have available....

View Article

A Honeypot for Malware Can be of Great Benefit to Your Organization

Have you been considering implementing a honeypot for malware? Attracting malware may seem counterintuitive but there are great benefits to be had from setting up a honeypot. You will attract malware...

View Article

How to Identify a Malicious Website

If you want to keep your computers and networks protected from malware, it is important to train your staff how to identify a malicious website. You should also install a powerful web filtering...

View Article


Ransomware Protection: SMBs Must Get Prepared

SMB ransomware infections can be time-consuming, expensive, or catastrophic. Which category an infection falls into will, to a large extent, depend on how you have prepared. If you run a SMB,...

View Article

Google Account Phishing Email Prompts AG Warning

Miss. attorney general Jim Hood has issued a warning to state residents to be extra vigilant after receiving a convincing Google account phishing email. The latest Google account phishing scam attempts...

View Article

Insider Phishing Scams Targeting UK Tech Companies

Criminals are using a new tactic to con money out of small to medium-sized businesses and startups, and are now using insider phishing scams to convince account department executives to make fraudulent...

View Article


iOS Malware Boom Expected in 2016

The rise in popularity of Macs, Macbooks, and iPhones has seen even more consumers make the switch from desktops and Android phones. As the number of Apple users grows, so too will the threat from...

View Article


2016 Security Threats: Where Your Next Attack May Come From

2014 was a bad year for IT security professionals, and thanks to some large scale cyberattacks, 2015 was not much better. However, what does 2016 have in store? What will be the biggest 2016 security...

View Article

Security Risk From Java Runtime Environment Security Highlighted by RAT...

Kaspersky Lab has recently discovered the extent to which a remote access Trojan is being used by cybercriminals, highlighting the security risk from Java Runtime Environment. Kaspersky Lab discovered...

View Article

California Data Breach Report: Majority of Cyberattacks Easily Preventable

According to a February 2016 California data breach report issued by the California attorney general’s office, the majority of data breaches are easily preventable if basic security measures are...

View Article

Medical Equipment Cybersecurity: Tomographic Scanner Hacked via Hospital Wi-Fi

In recent months, concern has been growing over the lack of medical equipment cybersecurity protections in place at hospitals and medical centers. Healthcare providers are being targeted by...

View Article


Locky Ransomware: New Threat Installed Using Malicious Word Macros

Locky ransomware is a new threat believed to emanate from the hacking team behind Dridex malware. The new threat is being delivered via spam email and is disguised as a Microsoft Word invoice. If...

View Article

Wireless Device Security Vulnerabilities Are Not Being Addressed

According to a recent report issued by Pwnie Labs, wireless device security vulnerabilities are not being addressed by enterprises even though many wireless devices can be used as backdoors into...

View Article


Ransomware Mitigation Policies Essential to Protect Against Rampant Ransomware

A new report issued by the Institute for Critical Infrastructure highlights the need for organizations to develop ransomware mitigation policies due to the high risk of cyberattacks involving the...

View Article

Employee Security Training Can Greatly Improve Security Posture

Employee security training is an essential part of an organization’s defense against cyberattacks, yet many CISOs and CSOs are not conducting regular training. In fact, according to a survey conducted...

View Article


Microsoft Makes it Easier to Block Malicious Word Macros in Office 2016

System administrators that do not block malicious Word macros in Office 2016 could be making it far too easy for hackers to compromise their networks. Malicious Word macros are nothing new, but in...

View Article

Image may be NSFW.
Clik here to view.

It’s World Backup Day – Could You Recover From a Data Disaster?

Today is World Backup Day – a day when awareness of the need to backup data is raised around the world. It is a day when companies that are not backing up their critical data are encouraged to do so,...

View Article

FBI Seeks Help To Deal With Enterprise Ransomware Threat

In February, the Federal Bureau of Investigation (FBI) issued an alert over a new ransomware called MSIL (AKA Samas/Samsam/Samsa), but a recent confidential advisory was obtained by Reuters, in which...

View Article
Browsing all 169 articles
Browse latest View live




Latest Images