What are DDOS attacks and how should Utah businesses prepare for them?

You’ve probably heard of DDoS attacks before — they’re some of the most common cyberattacks out there. They’re also growing more sophisticated. Generally, the perpetrator attempts to slow down or disrupt a network by overwhelming it with a flood of internet traffic and service requests, until the whole system crumbles under pressure and shuts down.

8 Ways to boost your network’s security

Every business network handles a range of sensitive data from financial records to intellectual property to personally identifiable information. To protect your organization from the rising tide of cyberthreats, it’s imperative that you take every reasonable step to ensure nothing bad gets in and no confidential records leave through unsecured channels.

WannaCry Ransomware: Learn More About the Attack

A new ransomware attack is infecting hundreds of thousands of devices all over the globe. Starting May 12, the ongoing attack uses malicious software called “WannaCry” (also “WannaCrypt” or “Wanna Decryptor”), which locks users out of their computers, and then demands a ransom for restoring the encrypted files.

The most advanced Gmail phishing scam yet

As the technology that recognizes and thwarts malware becomes more advanced, hackers are finding it much easier to trick overly trusting humans to do their dirty work for them. Known as social engineering, it’s a dangerous trend that is becoming increasingly prevalent. Read on to educate yourself on how to avoid the most recent scam […]

The phishing craze that’s blindsiding users

Most phishing attacks involve hiding malicious hyperlinks hidden behind enticing ad images or false-front URLs. Whatever the strategy is, phishing almost always relies on users clicking a link before checking where it really leads. But even the most cautious users may get caught up in the most recent scam. Take a look at our advice […]

Is the government really spying on you?

Wikileaks, the website that anonymously publishes leaked information, recently released a number of documents alleging widespread surveillance by the US government. The released documents claim that the vast majority of these efforts took place via smartphones, messaging apps and…TVs? Let’s see just how worrisome they really are. What devices and apps are supposedly vulnerable? Wikileaks […]