
How to Detect and Escape Evil Twin Wi-Fi Access Points
Geraldine HuntAn Evil Twin hotspot is a Wi-Fi access point set up by a hacker to mimic a legitimate AP to connect users to the fake network to steal data.
An Evil Twin hotspot is a Wi-Fi access point set up by a hacker to mimic a legitimate AP to connect users to the fake network to steal data.
Find out the key factors an MSP company should consider when choosing an exceptional security platform that lets your company stand out in a crowded space.
One rarely discussed benefit of cloud-based web filtering is how it improves network performance and eliminates the workload put on servers by other solutions for filtering Internet content.
Wireless systems remain a point of vulnerability for hackers to exploit. This article outlines some steps you can take to secure Wi-Fi in your business.
Most Systems Administrators do an excellent job; however sometimes, under pressure, mistakes happen. We have devised a target list of things for IT system admins to avoid at all costs.
DNS filtering is essential in protecting against web-based threats such as phishing and malware. Here we explain the risks, features, and benefits of DNS filtering and it can protect employees...
On December 9, 2021, Apache disclosed CVE-2021-44228 , a remote code execution vulnerability affecting the Apache Log4j2.
Discover the easy way to deliver an effective Internet filtering service to clients by speaking with us today about DNS-based content filtering.
Technology and attack vectors constantly change, making it even more important for a Managed Service Provider (MSP) to adapt to the evolving cyber landscape. Flexibility is the key to successful...
Hotels can exercise total control over Internet content by using WebTitan, a cloud based web content filtering solution.
Leading email and web security vendor TitanHQ are delighted to be exhibiting again at CompTIA EMEA. CompTIA is the leading trade association for the global technology industry.
The possibility of a malware infection is the reality for everyone who owns a computing device. Here are 11 strategies to help decrease your chance of opening the door to malware.
As an MSP offering, security awareness training complements security measures that perform first pass protection against phishing.
In most ransomware attacks, the start of the compromise is a phishing campaign. Threat actors only require one recipient to click a link to run malware on their system.
In a recent survey of cybersecurity professionals, 60% of respondents cited ransomware is a larger concern to their business than the global pandemic.
The proliferation of mobile devices demands a new type of web filtering architecture which is why cloud-based filtering solutions are quickly becoming so popular.
Hackers don’t hack machines, they hack people. The rise in people online in 2020 has resulted in cyberattacks based on human behavior.
A zero-day attack is a threat to which there is no defense in place. Zero-day attacks can be extremely harmful to an organization of any size.
Cyberattacks are currently soaring in the online retail sector. These businesses must protect themselves and their customers.
A preventable cyber-incident was responsible for the death of a person in Germany. The hospital’s emergency services suffered down-time due to a ransomware attack.
The number of ransomware attacks increased by 40% in Q3 of 2020. This equates to almost 200 million infections, globally.
We discussed xxx domains in a blog post a few years ago - there has been much litigation and controversy since. In this article we revisit the .XXX Domain Controversy...
With the sudden increase in remote working in 2020, the rush to provide employees with a workable environment wasn’t thoroughly planned, leading to oversights in relation to cybersecurity.
TA416, a hacking group renowned for their innovative methods of malware delivery, are on the attack again. This latest phishing campaign is complicated, clever, and persistent.
2017 saw a 23.9% increase in cybersecurity incidents involving the healthcare industry with 3,442,7748 records compromised for the year. Why is the theft of millions of health records such a common occurrence?
Discovered in 2014, Emotet has had several iterations to avoid discovery from anti-malware programs. It’s made a comeback in 2020 as a major threat against to organizations.
Email services such as Office 365 are vulnerable to large volumes of credential stuffing attacks. These are highly scaled attacks designed to find the weakest link quickly and easily.
As cybercriminals up their game and use more sophisticated and novel techniques to steal and plunder data and systems, what tools can help an organization fight back?
Zoom Users Beware: New sextortion email scam circulating. This scam is part of the ongoing exploitation of changing working patterns and new modes of collaboration.
Firewalls, access controls, user identity management, and other network fundamentals are all components in good cyber security posture. What’s missing in this list and often overlooked is email cyber...
Administrators must offer a work-from-home environment, but it must be done with cybersecurity as a priority. In a new ThreatPost report, researchers saw a 131% increase in viruses spread across the...
2020 has seen a 30% increase in cyber attacks between the months of July and August when a record 1,746,611 cyber attacks were recorded in a 24 hour period on August 18. This blog looks...
It’s easy to fall victim to phishing attacks targeting collaboration tools like Teams, the phishing page is made to look like the Teams login page. Users who do not...
Phishing is as much about human behavior as it is about technology. Cybercriminals know that tricking users into performing an action can effectively do the hard work for them.
The latest Office 365 phishing scam has three core elements that together make it a cyber-attack that is very difficult to detect and prevent.
Cyber-threats are a 360-degree problem. As such, an enterprise needs to tackle them across all entry points, including web-based attack points.
Palmerworm hackers have been hiding in corporate networks for months. Palmerworm uses a unique approach to tricking users into running malicious content.
DNS-based filtering is vital for the safe provision of Internet access to University students and employees - currently a major target for attack.
To protect Office 365 users we can turn to content filtering technology or more specifically DNS Filtering, but why is it needed, and how can it help?
Keeping employee communications smooth and unhindered has meant that email has taken a central seat at the technology table. How to manage corporate emails to ensure compliance, security, and privacy?
On Tuesday, 22nd September, 2020 we're running an exclusive webinar. Sign up to learn 'How to Ensure Business Continuity with Email Archiving for your Remote Workforce'.
At the start of the pandemic, 40% of MSPs expected to reduce their growth projection by at least 10%. Many MSPs are expecting a 'flat' year.
Cybercriminals are taking advantage of the COVID-19 pandemic and unleashing targeted BEC attacks. Scams are designed to trick victims into transferring data or funds to the scammers.
Defending sensitive data takes the right configurations, but even more important is the right security and detection tools. Cybersecurity should be proactive rather than reactive to avoid major data breaches.
Here's 15 of TitanHQ's Top free resources for system administrators, network admins and managed service providers
In this blog, we provide tips and insights into how MSP’s can thrive, not just survive, during these challenging times.
TitanHQ are in the process of deploying new and vastly improved ArcTitan systems in the EU and US. We will be migrating existing ArcTitan accounts to these systems.
In this article we examine recent research into how MSPs are adapting to COVID-19 and other challenges that so many companies are forced to deal with.
Sign-up for email updates...
Call us on USA +1 813 304 2544 or IRL +353 91 545555
Contact Us