by Brian Jefferson | Mar 7, 2024 | IT Security Blog
Google Enforcing New Email Rules – February 2024 The war against spam emails is nothing new – although in recent years it may have felt like the spammers were winning. However, Google has rolled out new email rules that it hopes will help protect users...
by Brian Jefferson | Jan 25, 2024 | IT Security Blog
What is a Fake Antivirus? You’re browsing the internet, perhaps doing some online shopping or looking for inspiration for your next vacation, and then an alert splashes across your screen. In big red letters, the popup informs you that A VIRUS HAS BEEN DETECTED and...
by Brian Jefferson | Dec 15, 2023 | IT Security Blog
What is an Advanced Persistent Threat? The type of malware known as ‘Advanced Persistent Threats,’ or APTs, sounds like something out of a sci-fi action movie – reminiscent of the Terminator T-1000. And, like a futuristic movie villain, APTs are far more capable...
by Brian Jefferson | Nov 14, 2023 | IT Security Blog
What is a Rootkit? When you run an antivirus scan, you expect it will detect all kinds of malware and malicious code. However, rootkits are an insidious type of computer virus that are capable of remaining undetected, sometimes for years! They can allow hackers...
by Brian Jefferson | Oct 18, 2023 | IT Security Blog
What is a Man in the Middle Attack? Today it is easy to feel like you’re constantly being watched – surveillance cameras sit on every corner and every online service makes us sign away our privacy rights first. However, nefarious actors have gotten in on the...