What is Hardware as a Service (HaaS)

What is Hardware as a Service (HaaS)

What is Hardware as a Service (HaaS) A small business can easily spend thousands of dollars (or more realistically, tens of thousands!) purchasing their computers and related hardware. This seemingly necessary expense is just the cost of doing business, right? While...
What is a Fake Antivirus?

What is a Fake Antivirus?

What is a Fake Antivirus? You’re browsing the internet, perhaps doing some online shopping or looking for inspiration for your next vacation, and then an alert splashes across your screen. In big red letters, the popup informs you that A VIRUS HAS BEEN DETECTED and...
What is an APT?

What is an APT?

What is an Advanced Persistent Threat? The type of malware known as ‘Advanced Persistent Threats,’ or APTs, sounds like something out of a sci-fi action movie – reminiscent of the Terminator T-1000. And, like a futuristic movie villain, APTs are far more capable...
What is a Rootkit?

What is a Rootkit?

What is a Rootkit? When you run an antivirus scan, you expect it will detect all kinds of malware and malicious code. However, rootkits are an insidious type of computer virus that are capable of remaining undetected, sometimes for years! They can allow hackers...
What is a Man in the Middle Attack?

What is a Man in the Middle Attack?

What is a Man in the Middle Attack? Today it is easy to feel like you’re constantly being watched – surveillance cameras sit on every corner and every online service makes us sign away our privacy rights first. However, nefarious actors have gotten in on the...
What is a Computer Virus?

What is a Computer Virus?

What is a Computer Virus? In today’s digital age, the term “computer virus” is almost as well-known as the common cold, yet the term is frequently misunderstood. At their most basic, a computer virus is a type of malicious software that...
What is a Trojan Horse?

What is a Trojan Horse?

What is a Trojan Horse? Like the giant, hollow wooden horse used against the ancient city of Troy, Trojan Horse viruses sit harmlessly outside of your computer’s walls until they are invited in. Disguised as useful applications or as attachments sent by a colleague,...
What is a Malware Attack?

What is a Malware Attack?

What is a Malware Attack? Many of us live in safe neighborhoods with relatively little crime. However, we can all agree that it’s still a good idea to lock your doors when you leave home and to take some basic steps to stay safe! It may be slightly hyperbolic to...
What is a botnet?

What is a botnet?

What is a botnet? Botnet is a term that sounds straight out of a science fiction movie, but while fanciful sounding these are a very real cybersecurity threat! A botnet, in simple terms, is a network of infected computers that is controlled by a hacker without the...