Next Generation Malware Infection: Watering Hole Attacks

Just when you think you’ve wrapped your head around how to best protect your computers, servers, and networks from phishing attacks, cybercriminals have developed a new, more sophisticated and effective, method to penetrate your systems. This new way of spreading malware and stealing personal or proprietary information is known as a watering hole attack. Unlike phishing, which relies on a ...

Blockchain and SMBs – It’s about more than Bitcoin

If you’re like most people, when you hear the word “blockchain” the first thing that comes to mind is probably Bitcoin or more broadly, cryptocurrency. And while Bitcoin has been the most visible and widely used example of blockchain technology thus far, the concept of blockchain has the potential to revolutionize the way SMBs do business moving forward. But before ...

Private Browsing: Does it really keep you safe?

Almost every browser has some variation of private browsing such as the “Incognito Mode” in Chrome or “InPrivate Browsing” in Edge and Internet Explorer. And while these private browsing sessions certainly do offer some significant benefits, don’t fall into the trap of thinking that it’s a silver bullet that will automatically keep all of your online activity safe and private. ...

What a Difference a Letter Can Make: The Importance of the “S” in HTTPS

Whether you are browsing the internet or your business has a public-facing website (especially one that collects or shares any sort of personal information or login credentials), understanding the importance of HTTPS is critical to ensuring online security. To fully appreciate why HTTPS is becoming a best practice, let’s start at the beginning and understand what the “S” represents. HTTPS ...

Gone Phishing: Email Fraud is Still Rampant as Ever

Although we’ve been talking about email fraud and phishing scams for more than a decade now, it hasn’t become any less prevalent – instead, the bad actors have just gotten better at their malicious craft. And perhaps we’ve all gotten a little careless and lazy too because we expect improved software technology to catch these things before they ever show ...

Lessons for Small Businesses from the Cambridge Analytica Scandal

By now you’ve probably heard about the Facebook-Cambridge Analytica data breach, and while you might have some concerns about your personal information and whether or not it was exposed, have you stopped to consider the implications something like this might have on your small- or medium-sized business? For starters, you can be certain that many people are going to re-evaluate ...

Security Breach Disclosures

As a consumer in the digital age, it is likely that your personal information has been compromised as part of a security breach somewhere. Some notable corporate breaches in recent years have included companies such as Home Depot, Yahoo, and Equifax, but the reality is that there are many more that you probably haven’t heard of unless your personal information ...

Facial Recognition Isn’t Foolproof: Data Security Considerations

The latest versions of facial recognition software (such as that included on the iPhone X) have certainly improved baseline device security without negatively impacting the user experience, but even these enhanced biometric authentication methods are not perfect. As such, it is important for businesses to continue to closely monitor how company data is accessed from mobile devices and not just ...

Think Twice Before Saving Passwords to Your Browser

In this digital age where seemingly everything requires a password, and password requirements are increasingly strict, it is understandable that users can feel overwhelmed when it comes to remembering all of their login credentials for various websites. But as convenient as the idea may sound, the IT experts at ATB encourage you to forego saving passwords and usernames in your ...

Your Business Has Recovered from a Cyber Attack. Now What?

If your business has been the victim of some sort of IT security breach, you’re definitely not alone. But believe it or not, what you do next might make your company stand out. It should be obvious (especially if you’ve been working with ATB for any period of time) that if you’ve experienced a cyber attack, even a seemingly minor ...