The Cyber Threat to Jamaica Is Real
We’ve all seen the latest news about the Ransomware attack on one of the Caribbean’s largest distribution companies. So, if you thought that cyber threat wasn’t close to home, then…
We’ve all seen the latest news about the Ransomware attack on one of the Caribbean’s largest distribution companies. So, if you thought that cyber threat wasn’t close to home, then…
With the increase in the number of remote workers and heightened internet activity, there are those who are intent on causing harm. Malware infections, URL spoofing, Phishing and social engineering.…
So while it is now firmly ingrained that layered security is best practice for securing enterprise networks throughout the industry it’s not a silver bullet. Identifying the right solution for…
Twenty billion US dollars. That’s how much experts expect the Ransomware industry to be worth come next year, up from a US$345m value in 2015. These staggering figures reveal both…
A lot has changed in Jamaican IT services since the first antivirus programs were created in 1987. For these traditional antivirus programs, when malware is initially detected , its unique signature (or fingerprint)…
October 2016 brought a massive and sustained Internet attack like nothing seen before. The Internet infrastructure company, Dyn, was attacked, and this caused outages affecting countless individuals and thousands of…
The hospitality and food and beverage industries are the second and third most frequently targeted industries of cyber criminals per the 2015 Trustwave Global Security Report. While the report states that…
Is Data Security important to your Business? Of course it is! But really how important is your data to your business? Can your business operate without access to information for…
In a modern business environment, the document creation process is dynamic, collaborative and iterative. A person might write a draft at work, finish editing at home with a tablet and…
In this digital age, cybersecurity cannot simply be a bolt-on checklist item, it must be something that is practiced from the start. Breaches are often due to fundamental oversight In…