ebook cover page - zero day attacks

Zero-day attacks – what you need to know

Zero-day attacks wreak havoc: protect your business You work hard to secure your business network. Yet determined hackers probe persistently until they find a software vulnerability you don’t know about. They use this previously unknown and unpatched flaw to do their worst. Zero-day attacks can steal data, corrupt files, take control of devices, install malware…

Recycle it for a cause

Let’s turn your old computer stuff into cash for the St Jude Children’s Research Hospital If you’re like me, you probably have a lot of older computer hardware sitting around. Old PCs, monitors, modems and routers – all things that probably worked great when you turned them off. But now that you’re on your third…

don't use weak passwords

The Security Series – Passwords

Keep yourself safe in cyberspace Online security is a big deal to me. Having worked in and been involved with online systems since the early 90’s (BBS’s anyone?), I’ve seen my share of illegal log ins, hacked password and general online account fraud. On the Sysadmin side of things, I’ve had to investigate and remediate…

Trend Micro CloudEdge UTM secures the network edge

Next-Gen Unified Threat Management protects against emerging threats Last week, we had the pleasure of hosting John Hermano, Vice President Product Management , Michael Domingo, Sr Systems Engineer and Noel de Guzman, Service Operations Manager from Trend Micro. They made a trip to our office to talk with us about their CloudEdge unified threat management…