dcsimg

Altaro partners with Wasabi to for disruptive pricing and performance.

Wasabi, the hot cloud storage company, now integrates seamlessly with Altaro VM Backup, the award-winning virtual machine backup and replication solution for Hyper-V and VMware environments, with a convenient, multi-tenant console for managed service providers (MSPs). This new integration enables Altaro customers, partners and managed service providers to securely and quickly save backups … [Read more...]

Put BIN attacks in the trash!

BIN attacks continue to be a serious problem for card issuers and merchants. Financial institutions struggle to find solutions. In Spain, police recently arrested 35 people in an international credit card fraud case, where the fraudsters used phishing, skimming, and BIN attacks to acquire card numbers. With these numbers, they made purchases and laundered money using bitcoin.   In … [Read more...]

THE VPN IS DYING, LONG LIVE ZERO TRUST

The traditional VPN is being replaced by a smarter, safer approach to network security that treats everyone as equally untrusted. The venerable VPN, which has for decades provided remote workers with a secure tunnel into the enterprise network, is facing extinction as enterprises migrate to a more agile, granular security framework called zero trust, which is better adapted to today’s world of … [Read more...]

What Is 5G Technology And How Must Businesses Prepare For It?

In some circles, there's been much talk about 5G technology and its imminent arrival. However, most individuals and companies haven't experienced it, although there's a lot of work being done behind the scenes to build, trail, and launch the infrastructure. When 5G does become widely available, we can expect immense opportunities for the technology just like we have with the launch of … [Read more...]

Email security best practices

Protect your online communication from phishing attacks and shield your business from any malicious activity. What are the risks? E-mail is now considered a key tool of every business and at the same time an opportunity to cheat on e-scammers. We could distinguish the challenges of message security into two major categories. The first one deals with email scams that target the human … [Read more...]

End of Support: Windows 7, Server 2008 & 2008 R2

Microsoft Product Support Expires On January 14, 2020, support for Windows 7, as well as Windows Server 2008 and 2008 R2 will stop «End of Season» for Windows 7 Microsoft has begun to inform Windows 7 users that security upgrades will stop on January 14, 2020.If you continue to use Windows 7 after January 14, 2020, your computer will continue to work, but it will become more vulnerable to … [Read more...]

Let’s talk Emotet malware

You may have heard about Emotet in the news. What is it: Ancient Egyptian king, your teenage sister’s favorite emo band? We’re afraid not. The Emotet banking Trojan was first identified by security researchers in 2014. Emotet was originally designed as a banking malware that attempted to sneak onto your computer and steal sensitive and private information. Later versions of … [Read more...]

GFI Software warns on impending Halloween malware

The top 10 IT security threats seen during September, says GFI, included a fraudulent online storefront promising cheap HP Touchpads; poisoned search engine results targeting users searching on Yahoo and Bing; and spam promising a US green card to would-be immigrants. According to Chris Boyd (aka Paperghost), a senior threat researcher with the security firm, over the last month, … [Read more...]

Kerio Connect vs Microsoft Exchange

Organizations wishing to operate their own mail servers have a number of different mail server platforms that they can choose between. Two of the leading platforms available today are Microsoft Exchange Server 2019 and Kerio Connect from GFI Software. This article examines the similarities and differences between these two platforms. Organization Size Microsoft Exchange Server can … [Read more...]

Protecting your business from coinminers

Did you know that ESET research has shown that coinminers are the most commonly detected malware that ESET customers encounter? Research from ESET in 2018 revealed that coinminers were the most commonly detected malware that our customers encountered - but what is it and what does it mean for your business? Malicious cryptominers, or coinmining, is a type of malware designed to steal the … [Read more...]