Archives - Cyberattack

Pay attention to security breaches in the news

Let’s say you have an account with an online store that becomes the victim of a cyberattack. Find out the details of that specific attack, then take necessary security steps to protect your information, such as changing login credentials or cancelling credit cards associated with your account.

Use a two-way firewall on your Mac

The built-in firewall on your Mac only provides inbound protection, which prevents cyberattacks from threats outside of your network. By installing a two-way firewall, you’ll have outbound protection as well, which keeps malware that’s already in your system from being able to connect to the internet.

Create a plan for dealing with cyberattacks

Once your system is infected with malware, there are steps you can take to fix the problem and prevent it from happening again. Disconnect from your network, reboot the device, download a virus scanner, and delete any old applications and files you don’t need.

How to protect yourself from cyberattacks during the coronavirus pandemic

The spread of COVID-19, aka the novel coronavirus, has had a profound impact on businesses and organizations across the globe. In order to help contain the virus, employers are doing their part by encouraging, or even requiring, workers to stay home and work remotely. With much of the workforce doing their jobs from home, there’s […]

Remove legacy plugins such as Flash and Shockwave

Plugins used to be essential to many rich web applications, but they’ve gradually been supplanted by technologies included in HTML 5. While some sites still require add-ons like Flash, it’s more efficient and safer to uninstall them, especially considering that Adobe – which makes Flash and Shockwave – has already announced their discontinuation. Doing so […]

What’s a Cyberattack?

A cyberattack is any type of offensive maneuver employed by nation-states, individuals, groups, society or organizations that targets computer information systems, infrastructures, computer networks, and/or personal computer devices by various means of malicious acts usually originating from an anonymous source that either steals, alters, or destroys a specified target by hacking into a susceptible system.