Quantcast
Channel: Competitive Edge Services - Security
Browsing all 15 articles
Browse latest View live

LinkedIn Confirms Encrypted Passwords Exposed

Professional social network LinkedIn confirmed on Wednesday June 6th that some of their users' passwords were stolen and millions appear to have been exposed on the Internet.LinkedIn did not reveal how...

View Article



Yahoo Confirms Theft of 450,000 User Emails, Passwords

Yahoo confirmed this week that hackers broke into one of its services and made off with around 450,000 usernames and passwords, in what amounts to the latest bit of bad news for the struggling search...

View Article

Top 3 Security Threats to the Small-Medium Business

According to the news, most security threats are coming from groups with advanced skills who are capable of launching destructive attacks that cause companies some major damage such as bad publicity,...

View Article

FBI Advises the Small Medium Business: Secure Your Systems

Systems within the Small Medium Business (SMB) space are at risk.  The FBI has been reaching out to the SMB marketplace to increase awareness of Cyber Crime and the preventative action needed.  Over...

View Article

Protect Your Data or Pay the Consequences: One Lost Laptop Costs Local Clinic...

When it comes to exposing personal data of patients and consumers, the government isn’t fooling around.  Recently, the Massachusetts Eye and Ear Infirmary was fined $1.5 million dollars for losing a...

View Article


Security Steps to Protect Your Systems and Minimize the Risk to Your Business

Data breaches can be time consuming and costly to your business.  Furthermore, they can damage your reputation.  To learn how you can minimize the risk to your business, check out our 10 minute video...

View Article

It's Time to "Step IT Up" when it Comes to Business and Data Security

A leaked FBI document cites that inadequate security practices are still widespread in both private and public sectors.  According to publication CRN, there have been attacks at various government...

View Article

Running a Business is Expensive - Protecting it Doesn’t Have to Be.

Protecting the data and systems that keep your business thriving is essential to more than just your reputation.  It’s essential to your survival.  A data breach can be devastating.  Sixty percent of...

View Article


Internet Explorer Zero-Day Security Flaw

For many businesses, a web browser is one of the most important tools you use on a daily basis. Being in marketing, I use it every day because of the number of web based tools I use. Most Windows users...

View Article


Image may be NSFW.
Clik here to view.

BYOD Security Advice

read more

View Article

Image may be NSFW.
Clik here to view.

Business Security: Are Your Systems Safe?

With the increasing number of security threats faced by businesses everywhere, most business owners have adopted some form of security measures in an effort to keep their companies secure. But, how do...

View Article

Image may be NSFW.
Clik here to view.

Cloud Security Measures for the Small Business

Related ContentRelated Blog Posts: Business Security: Are Your Systems Safe?BYOD Security AdviceConsidering Cloud Services? Start with Data BackupFBI Advises the Small Medium Business: Secure Your...

View Article

Image may be NSFW.
Clik here to view.

Chimera: a new kind of ransomware

There are numerous types of malware out there, but one really bad one is ransomware. While this destructive software has been around for a while, a newer, more dangerous upgrade called Chimera was...

View Article


Image may be NSFW.
Clik here to view.

Business Email Compromise

Business Email Compromise: Scams that trick executives, employees, and clients into transferring company funds to a criminal accounts.Related ContentRelated Blog Posts: Business Security: Are Your...

View Article

Secure Your Business with these Technology Polices

Employees can be one of your biggest security risks. There is no foolproof prevention method for human error, and this is why employee mistakes are one of the most common causes of a security breach....

View Article

Browsing all 15 articles
Browse latest View live


Latest Images