by Brian Jefferson | Nov 14, 2023 | IT Security Blog
What is a Rootkit? When you run an antivirus scan, you expect it will detect all kinds of malware and malicious code. However, rootkits are an insidious type of computer virus that are capable of remaining undetected, sometimes for years! They can allow hackers...
by Brian Jefferson | Oct 18, 2023 | IT Security Blog
What is a Man in the Middle Attack? Today it is easy to feel like you’re constantly being watched – surveillance cameras sit on every corner and every online service makes us sign away our privacy rights first. However, nefarious actors have gotten in on the...
by Brian Jefferson | Sep 5, 2023 | IT Security Blog
What is a Computer Virus? In today’s digital age, the term “computer virus” is almost as well-known as the common cold, yet the term is frequently misunderstood. At their most basic, a computer virus is a type of malicious software that...
by Brian Jefferson | Aug 2, 2023 | IT Security Blog
What is a Trojan Horse? Like the giant, hollow wooden horse used against the ancient city of Troy, Trojan Horse viruses sit harmlessly outside of your computer’s walls until they are invited in. Disguised as useful applications or as attachments sent by a colleague,...
by Brian Jefferson | Jul 14, 2023 | IT Security Blog
What is a Malware Attack? Many of us live in safe neighborhoods with relatively little crime. However, we can all agree that it’s still a good idea to lock your doors when you leave home and to take some basic steps to stay safe! It may be slightly hyperbolic to...