Topsec Cloud Solutions | News From the World of IT Security

AT&T Ordered to Pay $25 Million Due to Data Breach

Author: Niall Mackey
Date: Apr 30, 2015 12:00:00 PM
Topics: Cyber Crime

American telecommunications company AT&T has been ordered to pay a $25 million (£16.9m) fine to the Federal Communications Commission (FCC). Why?

In its overseas call centers in Colombia, Mexico and the Phillipines, AT&T suffered a major data breach in which the names and social security numbers were stolen from some 280,000 customers.

Read More

HSBC Breach Compromises Financial Security of US Customers

Author: Niall Mackey
Date: Apr 27, 2015 2:15:41 PM

Read More

4 Common Cyber Attacks You Should Look Out For

Author: Niall Mackey
Date: Apr 22, 2015 2:15:00 PM
Topics: Phishing, Cyber Crime

If you or your business haven’t fallen victim to a cyber attack, consider yourself lucky. Just last year (2014), there’s been a 23% increase in data breaches and a 200% increase in ransomware attacks. Despite increased measures to fortify IT infrastructures globally, businesses are still managing to allow hackers to compromise their computer security.

Read More

How Secure is My Data in the Cloud?

Author: Niall Mackey
Date: Apr 15, 2015 1:30:00 PM
Topics: IT Security, Passwords

One of the more popular, emerging technological advances that this century has introduced has changed the way we’ve thought of storing data. When one thinks of data storage, you think of a physical hard drive, a thumb drive or, if you’re old enough, a floppy disk. But, cloud technology has grown to become one of the top options for individuals and businesses across the world with its convenient ability to store your important data wirelessly.

Read More

Ransomware: What It Is & How to Avoid It

Author: Niall Mackey
Date: Apr 13, 2015 11:30:00 AM
Topics: IT Security, Email Security, Cyber Crime, malware, Ransomware

Among the several types of attacks that can be leveraged against your company’s IT framework, ransomware has the potential to be the costliest. Unlike some smaller types of viruses where the only damaging effect is to your peace of mind, ransomware takes internet hacking to a whole different level.

As you may expect, there’s a heavy price a pay for your actions if your computers are infected with ransomware. And the cost of clicking on a malicious link, opening an infected attachment or visiting a social network site can costs you upwards of 600. And that’s if you decide to comply with the hackers’ request.

In 2013, one of the major problems in the hacker world was the popular ransomware called CryptoLocker. The makers made away with about 3 million (USD) and through half a million infections. (You can read more about its effect here.)

However, let’s not get ahead of ourselves. We’ll start from the top.

Read More

Microsoft Changes Internet Explorer's "Do Not Track" Setting

Author: Niall Mackey
Date: Apr 9, 2015 11:30:00 AM

Microsoft has done a full 180 degree turn with its stance on the “Do Not Track” preference for its future releases in their Internet Explorer and Spartan web browsers. Now, Microsoft will turn the DNT’s default setting to OFF. Previously in 2010, Microsoft was the first to enable automatic DNT as it geared up to launch its Internet Explorer 10.
Read More

How Can I Make Sure My Emails are Safe?

Author: Niall Mackey
Date: Apr 7, 2015 4:55:00 PM

Over 100 billion emails are sent and received every single day. And for businesses, this is the most popular way to communicate with fellow employees, partners and clients. And while awfully convenient, using your e-mail to communicate in the business world also opens the door for mischief among the hacker and cyber criminal community.

Now, although there are risks that are taken every time you press the ‘Send’ button, there are also ways to make sure that your communication doesn’t harm you or the recipient of your message. Harmful consequences such as phishing scams or unauthorized attachment downloads can cause great harm to your company’s IT infrastructure.

We hope your current computer network is already armed with anti-spyware, anti-malware and virus protection software as a preliminary line of defense. To help you even further, we’ve listed these helpful tips so you can fully arm yourself with the proper e-mail strategies to make sure your messages are sent securely.

Read More

2 Web Browser Vulnerabilities You MUST Know

Author: Niall Mackey
Date: Apr 3, 2015 11:30:00 AM

Often times, when you’re protecting the internet infrastructure at your company, cyber attacks can come from a series of entryways. Clicking unauthorized links, failing to log off properly or not encrypting emails with sensitive information are all practices that can make it easier for cyber criminals to infiltrate your business.

One area that is becoming a growing concern for numerous companies is the actual web browser itself. As your liaison to the world wide web, it’s practically impossible to make your way to necessary websites without a browser. And it’s this reason that makes it a bit difficult to play defense on malicious attacks that are implemented through Internet Explorer, Mozilla Firefox, Google Chrome or Apple’s Safari.

To help you stay ahead of the curve, we’ll break down two of the most common web browser vulnerabilities so you’re aware of the errors or breaches that yours is susceptible to.

Read More

Keep Your Router Hacker-Proof with These Tips

Author: Niall Mackey
Date: Apr 1, 2015 8:25:29 PM
Topics: IT Security, Phishing, Cyber Crime, Spam, malware, Computer Viruses

Running a business that requires much technology can be a pain if you’re not used to the security detail that must be done beforehand. Fortunately, if you have an IT team, this task can be much easier and stress-free. Not only do you have to focus on having the right state-of-the-art technology that suits your company’s needs, but one that also addresses your client’s concerns.

While you establish this infrastructure, it’s equally as important that the safety of your team is fully fortified. From your emails to data storage to passwords to encryption, each area could be a potential hotbed for criminals to compromise the safety of you, your clients and employees.

Read More