webmailhelpdesk

facebook linkedin twitter youtube

Blog Archives

Cloud – first stragety | Up In Smoke?

Cloud Service - Up in smoke?

Cloud First – Up in Smoke Businesses the past few years have been moving more and more to the cloud for much of their infrastructure by moving workloads and apps (applications) to the cloud.  However, that’s not necessarily the right or

Tagged with: , , , , , , , , , , , , ,
Posted in Blog

Risky Security Habits in your Business

Risky security practices in your business.

Security is very important and to say breaches are detrimental to any business is a simple understatement.   Not only the financial costs involved to resolve the issue, a damaged reputation is difficult to overcome — and customer trust is tough

Tagged with: , , , , , , , , , , , ,
Posted in Blog

Locky Ransomware -What You Need To Know

Locky Virus

Ransomware -What You Need To Know We are compiling a new post regarding details of a VERY NASTY little piece of Malware / Virus / Ransomware called Locky Ransomware. We first alerted everyone of this malicious program on March 11,

Tagged with: , , , , , ,
Posted in Blog, Uncategorized

Alert “Locky” Cute New Ransomware, that’s NOT SO CUTE.

  Another new ransomware has been detected, and though its name is cute, this is no joke. The not so fun part of this new ransomware will encrypt almost every commonly used file type, and targets not only your pc

Tagged with: , , , , , ,
Posted in Blog, Uncategorized

What is a data breach?

Risky security practices in your business.

What is a data breach? So what is a data breach?  Simply put, a data breach is when an individual’s name plus a Social Security number, driver’s license number, medical record or financial record (credit/debit cards included) is exposed because of a

Tagged with: , , , , , , , , , , ,
Posted in Blog, Uncategorized

Don’t Be A Victim of Spear Phishing

Question

How to Prevent Spear Phishing and Phishing Scams Most of us have heard of email phishing (pronounced fishing), but have you heard of spear phishing?  Maybe not, but this is the latest twist on email, and social media phishing scam. Spear

Tagged with: , , , , , , , , ,
Posted in Uncategorized

Shellshock BASH flaw leaves Mac OS X, Linux, and more open to attack!

Linux & Mac Vulnerabilities  Security experts discovered a flaw in the widely used Unix Bash shell, leaving Linux machines, Mac OS X machines, firewalls, routers, and many more devices vulnerable to attack.  The vulnerability, called “Shellshock”, apparently has been in the BASH

Tagged with: , , , , , , , , , , ,
Posted in Uncategorized

Protect Your Business From Being The Next Victim Of Cyber Crime

lock it

An alarming trend of high profile security breaches seems to be happening almost daily. So what should you do? Well if you are the Owner, CEO or Executive of a business, you need to pay attention to this trend. You

Tagged with: , , , , , , , , , , , , ,
Posted in Blog, Uncategorized

In business you need to watch your apps.

Socail media for business.

Protect and Secure I.P. So you think you are safe when collecting an ex-employee’s mobile phone or computer? Maybe not…Many businesses leave themselves open to possible vulnerabilities because they don’t control cloud-based accounts. All too often this is not something

Tagged with: , , , , , , , , , , ,
Posted in Uncategorized

HEARTBLEED BUG (Real or Hype?)

Over the past few days you may have heard of a problem that maybe affecting as few as 17% or much as 67% of the internet. A much talked about problem, but still confusing issue called Heartbleed. So what is Heartbleed

Tagged with: , , , , ,
Posted in Uncategorized

We’re On Facebook

FREE Consultation

Slick Cyber Systems knows business computer & networking security is essential to protecting your company from viruses, spyware, hackers, and other threats.