The world today is the best possible scenario for small and medium sized businesses. For the first time ever, small business has access to the same IT communication and collaboration infrastructure as big business, giving the former the best opportunity
With the increase in the number of remote workers and heightened internet activity, there are those who are intent on causing harm. Malware infections, URL spoofing, Phishing and social engineering. You name it. Cyber threats are at an all-time high.
You don’t have to know everything about how your IT plan for disaster recovery works. But there are two critical metrics related to that plan that should be clearly defined before you sign-off on the budget for the next fiscal
Twenty billion US dollars. That’s how much experts expect the Ransomware industry to be worth come next year, up from a US$345m value in 2015. These staggering figures reveal both the extent of the payouts to these attackers as well
A lot has changed in Jamaican IT services since the first antivirus programs were created in 1987. For these traditional antivirus programs, when malware is initially detected , its unique signature (or fingerprint) is identified and added to a database of ‘known malware’.
October 2016 brought a massive and sustained Internet attack like nothing seen before. The Internet infrastructure company, Dyn, was attacked, and this caused outages affecting countless individuals and thousands of online retail operations in the USA. It directly affected users
The hospitality and food and beverage industries are the second and third most frequently targeted industries of cyber criminals per the 2015 Trustwave Global Security Report. While the report states that 65 percent of breaches were through POS terminals, the other