Blog Search


Searched Tag: cybercriminal

Three Responses After a Ransomware Attack

If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options of recovery available. It has become increasingly common for criminals using ransomware to attack governments, businesses and non-profit institut…
If you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options of recovery available. Ransomware is a type of computer malware th…… https://customcomputer.me/blogs/three-responses-after-ransomware-attack

Employee Training & Cybersecurity

Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correctly to cyberthreats. Here are some employee training best practices that you ca…
Employee training will form a big part of the cybersecurity initiative that you will take on as an organization. You need to train your employees to identify and respond correc…… https://customcomputer.me/blogs/employee-training-cybersecurity

DNS Cache Poisoning: What Every SMB Must Know

In one of the most common poisoning attacks, the attacker poisons the DNS cache with the aim of leading visitors to a fake website. The attacker gains control of the DNS server and then manipulates cache data such that anyone typing the URL of an actual w
In one of the most common poisoning attacks, the attacker poisons the DNS cache with the aim of leading visitors to a fake website. The attacker gains control of the DNS server…… https://customcomputer.me/blogs/dns-cache-poisoning-what-every-smb-must-know

Online shopping? Watch Out for These Red Flags

Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. But, did you know cybercriminals love the concept of online shopping as much as you do? Cybercriminals are exploiting t…
Who doesn’t like online shopping? Online shopping has opened up a whole new world to us. Get whatever you want, whenever you want, without wandering from store to store. …… https://customcomputer.me/blogs/online-shopping-watch-out-these-red-flags

How Safe is Your Data When Your Staff Works from Home?

With social distancing, lockdowns and work from home becoming the new normal, cybercriminals are exploiting the situation to their gain. Find out how the cybercrime landscape is likely to shape up in the post-pandemic world and you can safeguard your busi…
The Coronavirus crisis has changed the world as we know it. With social distancing, lockdowns and work from home becoming the new normal, cybercriminals are exploiting the situ…… https://customcomputer.me/blogs/how-safe-your-data-when-your-staff-works-home

Data Safety Best Practices in a Remote Work Environment

Do you have staff working from home? Many businesses shifted to the remote working environment through the pandemic. While it raises some data security concerns, they can be overcome by following a few best practices.
Do you have staff working from home? Many businesses shifted to the remote working environment through the pandemic. While it raises some data security concerns, they can be ov…… https://customcomputer.me/blogs/data-safety-best-practices-remote-work-environment

Internal Threats: A New Angle to Email Security

You know how important your email system is to your business, but do you have a good email security system, ensure your emails are always backed up, archived and stored safely? What about keeping your email system safe from threats within your organizatio…
You know how important your email system is to your business. Not only is email your core communication tool, but it also bears a lot of weight from a legal perspective and mus…… https://customcomputer.me/blogs/internal-threats-new-angle-email-security

Introduction to the Dark Web

As a business, you might have heard that you need to keep your data safe from the dark web. So, what is it anyway?
Have you come across the term “dark web”? As a business, you might have heard that you need to keep your data safe from the dark web. So, what is it anyway? What…… https://customcomputer.me/blogs/introduction-dark-web

What is Dark Web Monitoring?

The dark web is essentially a marketplace for cyber criminals. If your data has been compromised, the dark web is the place where it is traded.
The dark web is essentially a marketplace for cybercriminals. If your data has been compromised, the dark web is the place where it is traded. It could be sold by miscreants, t…… https://customcomputer.me/blogs/what-dark-web-monitoring

Social Media Reminders

Sloppy social media habits can lead to a compromise that extends beyond an individual’s personal account. A hacked social account could lead to access to business credentials or more.
Sloppy social media habits can lead to a compromise that extends beyond an individual’s personal account. Many people don’t realize that their login credentials tie…… https://customcomputer.me/blogs/social-media-reminders