Loading

Security Archives - Wowrack Blog

Category / Security

  • October 26, 2022 - admin

    How to Handle Destructive Malware

    It’s not uncommon to deal with malware at some point in our lives. Afterall, there has been a steady increase in malware attacks.  In 2020, 61% of organizations experienced malware activity. That percentage has grown to 75% since then. This begs the question: “how do I handle malware?”. What is Destructive Malware? Destructive malware is […]

    READ MORE >
  • October 20, 2022 - admin

    Password Policy Best Practices

    Another 90 days have come and gone, and then you see an all too familiar security message “It’s been 90 days since you’ve changed your password”. Annoyed, you sigh and go through process of changing your password. While it sounds like you are doing your part to stay secure, that is not quite the case. What […]

    READ MORE >
  •  WARNING! Your computer is infected with malware!  Have you seen a similar message or pop-up as you browse through the internet? These kinds of pop-up messages are fake virus warnings, and clicking on one of these links may result in your computer getting infected for real.   This begs the question “How is that possible?”. Because […]

    READ MORE >
  • Firewalls are on every computer. After all, they do come pre-installed and are a necessary component for keeping your network safe. However, hackers will still attempt to infiltrate your network and infect your computer with viruses. To understand how attackers get past your security it’s important to understand what a firewall is. What is a […]

    READ MORE >
  • October 7, 2022 - Shania Nadine K.

    What is Ransomware and How to Deal with It

    Have you ever received a suspicious e-mail or message that asked for your password or personal details? Those kinds of messages are also known as phishing messages that use social engineering techniques. Clicking on those links, downloading those files, and entering your details on those suspicious sites can result in not just your personal data […]

    READ MORE >
  • It’s not uncommon for everyone to experience a network problem. As you can guess, everyday comes with a challenge whether it’s recovering files or fighting of a ransomware attack. What was the Network Problem? A local school district was targeted by cybercriminals. With a lack of budget and holding the belief that school districts are […]

    READ MORE >
  • Having a secure network is something everyone needs for both personal or professional use. It prevents attackers from accessing important information and acquiring access to your system.  What is a Secure Network?  On a surface level, a secure network is any network that puts security measures in place to help protect your system from outside […]

    READ MORE >
  • August 21, 2022 - Shania Nadine K.

    Remote Working: Top 5 Cyber Security Risks and Tips

    Working from home or remote working has become a trend that continues to flourish even as the pandemic winds down, as workers prefer to work from home. Aside from increased benefits, working remote also brings risks that employees must face when working in an unsecured cyber environment. The growing number of companies opening opportunities for […]

    READ MORE >
  • IT security opened in 2022 with the discovery of Log4j vulnerability, or “Log4shell,” at the end of November 2021 bring about realization to the current IT condition. As the world transition towards the digital realm, it opens large windows for bad actors to capitalize on unprepared targets. World Economic Forum assessed in 2021 that cyber-attack […]

    READ MORE >
  • January 9, 2022 - First Tiyan

    The Log4j Vulnerability: What You Should Know

    With the rapid development of computer technology, be it software or hardware, there are times when this development creates a gap within the system. Within the industry, we call this gap a vulnerability. Simply put, vulnerability is a weakness that actors can use to infiltrate or access computer systems. Today, we are reminded of this […]

    READ MORE >