Our Blog
Cybersecurity Lingo: What is a “botnet” ?
Cybersecurity Lingo: What is a "botnet" ? A botnet is a group of computers bad guys have under their control, usually thousands or more. Botnets [...]
Take a Break and Have Managed IT Services
According to WATE, Knoxville police pulled over a driver speeding down I-40 at over 100 MPH in May. Why? He said he needed to use [...]
Cybersecurity Lingo: What is a “zero day” ?
Cybersecurity Lingo: What is a "zero day" ? A zero day is the worst kind of security bug: a hole that is already in use [...]
Cybersecurity Lingo: What is a “CVE”?
Cybersecurity Lingo: What is a "CVE"? It is a unique ID for a specific security bug. This ID is unique to every bug ever found, [...]
Cybersecurity Lingo: What is a “malicious actor” or a “bad actor”?
Cybersecurity Lingo: What is a "malicious actor" or a "bad actor"? The rest of the world calls these people hackers. It's pretty simple. Inside computer [...]
Cybersecurity Lingo: What is an “Attack vector” ?
Cybersecurity Lingo: What is an "Attack vector" ? This is *how* a malicious actor enters your system. For instance, they may buy passwords on the [...]
Cybersecurity Lingo: What is an “Attack Surface” ?
Cybersecurity Lingo: What is an "attack surface"? Simply: it is anywhere an attacker can get into your systems if proper security is not applied. This [...]
UPDATE YOUR SOFTWARE ALREADY
I know I know, you hear it all the time, BUT UPDATE YOUR SOFTWARE. Today's bugs all come from Chrome, where we have MULTIPLE security [...]
Free Threat Hunting Special Limited Time Offer
Did you know that the average time a Hacker is in your network is 6 months BEFORE they strike? There are TWO recent KNOXVILLE Ransomware [...]
Why You Should Start Encrypting Your Laptop
In March, we brought on a new client whose previous IT provider did not insist on encrypting laptops. One of the users also had a [...]
Don’t Use A VPN. Do This Instead
VPNs have been all the rage for the last couple of years. The hype is that they protect your privacy, encrypt your traffic, and increase [...]
Ukraine Invasion | 3 Cybersecurity Steps To Prepare For It
The Department of Homeland Security released a warning letter on 23 January 2022 — expect Russia to come for you. So what are the 3 Cybersecurity [...]
WordPress: I’ll Download that Database, Please
A recent WordPress vulnerability allows hackers to basically download* the entire site. Here's why that matters to you: Your small business website probably runs on [...]
Alexa, Please Hack Yourself
Amazon "smart speakers" can now hack *themselves*. 🤦 Academic researchers have devised a new working exploit that commandeers Amazon Echo smart speakers and forces them [...]
Serious Linux Bug
A couple of weeks ago one of the most significant bugs ever found in Linux was announced, here is why that matters to you: 1. [...]