USB drives, also known as thumb drives, flash drives and USB sticks, have become a popular form for storing and transporting files from one computer to another. Their appeal lies in the fact that they are small, readily available, inexpensive, and extremely portable. With easy storage and portability comes a responsibility to ensure sensitive business data that can be placed on portable devices is safe and secure. However, these same characteristics make them attractive to attackers and also makes them more dangerous than previously thought.
iPhone Hacking Campaign Targeting Users With Data-Stealing, Location-Tracking Malware
For many iPhone users, the thought of being a victim to a malware attack doesn’t often cross their mind. That’s because there is a common misconception that Apple operating systems are unable to be hacked. Android users have been vulnerable to malware attacks for years, however recently there has been a hacking campaign that targets iPhone users with data-stealing and location-tracking malware.
Synapse IT Consultants are now a Datto Professional Partner
Synapse is excited to announce that we are now a Datto Professional Partner. Being part of the Datto Professional Global Partner Program means we can help to protect essential business data for our customers, while delivering uninterrupted access to data on-site, in transit and even in the cloud. This service is an integral part of any Business Continuity plan.
The New Way of Understanding Data Protection
The electronic systems used by businesses of all sizes operate with a range of sensitive and confidential data. These systems must be optimally secured, to protect not only your business, but your partners and clients also.
Overseeing your data security can be an overwhelming task. We’ve provided a simple airport security analogy to help you understand the 4 stages you need to undertake to implement a comprehensive data protection plan.
Mandatory Data Breach Reporting for Small Business
For many small business owners, reporting a data breach can be the last thing on their mind. However, new laws that have recently come into effect mean that non-disclosure of any data breach can result in crippling fines for these businesses.
End of Life for Malware Bytes
MalwareBytes AntiMalware for Business is now end of life. As a result, we are removing this system from our toolset.
We are strengthening our relationship with Webroot which provides best in class antivirus, anti-malware, anti-ransomware, anti-phishing, and zero-day threat protection to keep your network safe.
All Wireless Devices are at Risk of a Krack Attack
A security flaw made a concerning appearance last week after the bug, dubbed a ‘Krack attack’, was discovered by Belgian researchers. Targeting Wi-Fi encryption, the bug can access safely encrypted information such as emails, passwords and credit card numbers. Continue reading to find out everything you need to know about this flaw and how to reduce your risk of an attack.
Microsoft’s Cloud Attacks have Risen by 300% - Don’t be a Victim
A new report (published by Microsoft themselves!) has shown the company's cloud cyber security attacks have increased by an astonishing 300% from 2016.
You Need to Know how Your Favourite apps are Hacking Your Information
Every time you install an application onto your phone, you are asked to allow that app certain permissions in order for it to function properly. However, by allowing these permissions you in turn leave your personal information vulnerable to exploitation.
Why You should have a complex password policy
The 'chronic failure' to use secure passwords has grown increasingly concerning for individuals and companies alike. Password hacking software now enables passwords, thought to be safe, to be unscrambled within seconds. We have compiled the top reasons why implementing a complex password policy is vital for your protection and exactly how to put it in place.