Security

What You Need to Know About VMware and Browser Settings

Posted date: January 5, 2018

FROM THE DESK OF MIKE MADDOX: In our last blog post, I provided an informational bulletin regarding recently discovered microprocessor vulnerabilities and the potential for these vulnerabilities to lead to security breaches. This is a huge issue that ...

Read More »

What You Need to Know About Recent Processor and Chip Vulnerabilities

Posted date: January 4, 2018

From the desk of Mike Maddox: You have probably seen the news reports regarding microprocessor vulnerabilities and the potential for these vulnerabilities to lead to security breaches. ASK has put together the information below in an effort to keep y ...

Read More »

7 Cybersecurity Questions to Ask After the Equifax Breach

Posted date: November 27, 2017

The recent Equifax breach has many business leaders asking what could have been done to avoid this breach and what they can do to make sure this does not happen to their business. On a recent segment of the Bottom Line IT Show, Mike and Amy discuss a ...

Read More »

World’s Largest Spambot Discovered

Posted date: October 22, 2017

If you are not familiar with what a spambot is, they are programs designed to collect e-mail addresses from the Internet in order to build mailing lists for sending unsolicited e-mail. The recipient of the spammed email has no idea the email is not c ...

Read More »

The Motives Behind Ransomware: Financial Gain or Just Destruction?

Posted date: September 22, 2017

What are the real motives behind ransomware attacks? Most experts believe most ransomware attacks can be traced back to money, but some experts are now saying that might not always be the case. NotPetya, an attack that targeted the Ukraine this past ...

Read More »

NotPetya Ransomware Not Designed to Make Money

Posted date: August 25, 2017

NotPetya, the recent ransomware attack that infected PC’s around the world spread faster than the notorious WannaCry ransomware. Its rapid proliferation wasn’t the only thing that set NotPetya apart. According to security experts, this attack ...

Read More »

Phishing Scams – How to Protect your Business

Posted date: July 28, 2017

What is a Phishing Scam? Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises in order to obtain sensitive information such as usernames, passwords, and credit card details and, indirectly, money. T ...

Read More »

Security? What Security? Four Million Stolen Data Records Everyday

Posted date: May 26, 2017

Nearly 1.4 billion data records were stolen by hackers or lost during 2016, almost double the number of what was comprised the previous year, according to figures published in Gemalto’s Breach Level Index Report for 2016.   This number is on ...

Read More »

Cyber-Crime: Do We Have Your Attention Now?

Posted date: May 15, 2017

If you thought your organization was too small to be affected by cyber-crime, it is safe to assume that the WannaCry(ptor) ransomware attack was eye opening. Malware (which includes ransomware), credential theft, and other common cyber-crimes aren’ ...

Read More »

A New Variant of Crypto-Ransomware Hits the Globe

Posted date: May 15, 2017

Have you heard the news? On Friday, May 12th, a new variant of Crypto-Ransomware (WannaCry) was released worldwide causing major disruptions at hospitals, private and public institutions, and has since garnered major media attention. This attack was ...

Read More »