Cyber Security- Don't let a ghost control your phone There are so many ways now to have our computers hacked, but we forget about our phones. We already know that we shouldn't leave our devices unattended without a password. Furthermore, most of our phones now are...
cyberthreat
ISO 27001 – certification celebration!
From IASME GOLD to ISO 27001 In the past six months, we have been working hard to improve our internal policies and procedures so that as we grow we can consistently deliver the same high-quality service to each and every one of our clients. We are delighted to...
Cyber Crime – Why I don’t fear it
Cyber Crime - why I don't fear it Cyber Crime is a very serious threat to your business that could tarnish it's reputation with customers if Cyber Security measurements haven't been put into place, with a chance of an additional hefty fine from violating the GDPR,...
Do you have a fax? Be sure it won’t get faxploited
It's funny that we take some pieces of technology for granted, we never think they could harm us and our businesses, but in the end, we find out that our ignorance harmed us. This is the case with faxes, a bit antiquated, a machine everybody forgets about, but one...
Crypto- you could be mining for hackers
On August 2nd, Hackernews reported that over 200000 MikroTik routers were infected with Crypto mining malware. The hackers exploited a known vulnerability in the Winbox component of MikroTik, this was discovered in April and patched in just a few days after the...
Ransomware- WannaCry did not return
Today we had several clients reporting to us that they received an email claiming that the WannaCry ransomware is back. That email has the following text, with different modifications: Hello! WannaCry returned! All your devices were hacked with our program deployed on...