CALL US 1800-399-2000

Uzado's Blog

The Latest Cybersecurity News and Advice... All Available Here!


The Yahoo Data Breach:  What happened?

By Alix Postan October 11, 2017

You’ve probably heard by now that Yahoo’s data breach in 2013 wasn’t contained to include only 1..

If it weren’t for our users…

By Maria Catricala September 20, 2017

When you ask the people about computer security, most would probably say that hackers and viruses..

How to Protect Your Business From Ransomware Attacks

By Maria Catricala September 8, 2017

A quick glance of the recent news shows an alarming trend of malware and ransomware attacks on..

Move Over Nokia… The NYPD is Switching to iPhones

By Alix Postan August 30, 2017

When the NYPD (New York Police Department) announce that they are changing cell phone providers,..

Top 4 Cyber Attacks Your Business is Likely to Face and What to do About Them

By Maria Catricala August 28, 2017

Does thinking about cybersecurity keep you awake at night?  Does it seem like an overwhelming task..

HBO’s Game of Thrones Has Been Hacked!

By Alix Postan August 11, 2017

On July 31st, HBO confirmed that they had experienced a breach that compromised some of its..

Who Needs a Risk-Based Approach to Vulnerability Remediation?

By David Millier August 9, 2017

The answer is everyone? Anyone and everyone doing business in the modern business environment.

Many..

Is Cash Becoming Worthless? Or is Cashless Becoming Priceless?

By Alix Postan July 28, 2017

July 2017 marks the month where debit card transactions have inevitably surpassed cash payments,..

You Need a Risk-Based Approach to Vulnerability Remediation

By David Millier July 14, 2017

Many businesses mistakenly assume that by complying with industry standards and legislation, their..

Why Do I Need a Managed Services Provider?

By Maria Catricala July 7, 2017

Before we can answer the question as to need, we need to know what a managed service provider..

5 Steps to Basic Vulnerability and Remediation Management

By Alix Postan July 5, 2017

Vulnerability and Remediation Management can easily become overwhelming when you see such an..

Your computer could be in danger of another ransomware attack

By Alix Postan June 30, 2017

This specific ransomware is called: Petrwrap.

Ransomware is a malicious software that either..

Search

Subscribe to Email Updates