Give us a call

Ferrum Technology Services Blog

Ferrum Technology Services has been serving the Elgin area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Not All Malware is Created Equal

Not All Malware is Created Equal

When people talk about network security, it’s just like they are talking about any other subject, the most terrible and devastating of the bunch is all that is spoken about. In the case of malware, there is a lot of information about ransomware going around out there because it is largely the worst type of ransomware there is for any organization. Unfortunately, malware is a vast and largely misunderstood thing. Today, we thought we would briefly go through modern malware so you can identify if you are a victim or not. 

0 Comments

Facts that Will Help You Identify Phishing Attacks

Facts that Will Help You Identify Phishing Attacks

Phishing messages are one of the scarier threats out there, especially when you consider that they force you to be on edge about most messages you receive, regardless of how sound they might appear to be. Thankfully, there are various telltale signs that you can look for when analyzing the messages you receive on a daily basis that can clue you in on some of the more suspicious phishing messages.

0 Comments

Cybersecurity Will Get More Dicey in 2022

Cybersecurity Will Get More Dicey in 2022

All businesses must make securing their infrastructures and reinforcing cybersecurity practices a priority, especially as we move into the new year. This is a concept that involves securing the network, infrastructure, and data from the countless threats out there. Here are three of the most important issues to keep in mind when building your cybersecurity strategy for the new year.

0 Comments

IoT Attacks Are Making Network Security Difficult

IoT Attacks Are Making Network Security Difficult

There are a lot of “smart” devices out there—over 35 billion and counting—and more and more are being connected to the Internet all the time. These endpoints, often called the Internet of Things, are known as vulnerabilities to hackers, as most devices don’t offer the type of comprehensive security that they need to keep from being problematic. What might surprise you, however, is that the primary exploit comes from devices that ironically are thought of as security devices: The ones found in a smart home.

0 Comments

Why a Password Manager is a Must-Have

Why a Password Manager is a Must-Have

Businesses and their employees ultimately need a lot of different online accounts, which means there are a lot of passwords that need to be sorted. To assist with this, many have turned to using password managers—applications that store passwords in an encrypted vault. There are a lot of reasons that these password managers are a popular choice. Let’s go over a few of them.

0 Comments

Self-Healing Networks on the Horizon

Self-Healing Networks on the Horizon

These days, if you are not taking cybersecurity seriously, then you are waiting for something bad to happen that could potentially destroy your business for good. While the number of threats out there has increased significantly over the past couple of decades, so too has the number of powerful security options out there. In fact, one way that you can leverage these solutions to your advantage is to use “self-healing” security software, the concept for which is pretty neat.

0 Comments

You Should Be Training Your Staff on Phishing Tactics

You Should Be Training Your Staff on Phishing Tactics

Phishing attacks are a major problem that all businesses must be prepared to handle. Sometimes it comes in the form of messages or web pages designed to steal information from your employees, but other times it might come in the form of phone calls asking for IP addresses or network credentials under the guise of your IT department. It’s especially important that your staff members understand how to identify these tricks, and it all starts with phishing training.

0 Comments

Ransomware is a Serious Problem… Here’s How to Deal with It

Ransomware is a Serious Problem… Here’s How to Deal with It

Ransomware has been a scourge to businesses for years now, with it unfortunately experiencing a renaissance of sorts as the COVID-19 pandemic came to the fore. With increased phishing attacks and other means of spreading ransomware now taking advantage of the ongoing situation, it is all the more important that these attempts can be identified and mitigated.

0 Comments

Passwords Still Give Small Businesses Trouble, Says LastPass Report

Passwords Still Give Small Businesses Trouble, Says LastPass Report

In today’s business environment, where ransomware strikes just as often as just about any other threat out there, you need to take as many precautions as possible so that your organization does not become another victim or statistic. All it takes is looking at reports from various security firms to understand just how important even the most basic of security measures—the password—is toward keeping businesses safe.

0 Comments

Better Security Training Starts with Engagement

Better Security Training Starts with Engagement

Your organization’s network security is dictated in part by your security solutions, but your employees also play a large role in maintaining it. If you want to make sure that your employees are not inadvertently putting your organization at risk, you need to ensure they are getting the proper security training. Here are a couple of ways you can make security training less like pulling teeth and more engaging for your employees.

0 Comments

Three Practices to a More Secure Network

Three Practices to a More Secure Network

The past year has been tough on businesses, if only because of how unpredictable everything has been. As far as network security goes, however, most of the threats that were plaguing companies before the pandemic are the same ones that IT administrators are dealing with today. Curiously, it seems that a week can’t go by without a major data breach. Why is this happening? Simply put, the fundamentals of security management are being neglected. Let’s take a look at three practices that need to be followed in order to keep your organization from being a victim of a scam or cyberattack.

0 Comments

A Company’s Cybersecurity Culture Starts from the Top

A Company’s Cybersecurity Culture Starts from the Top

There are countless aspects of running a business that demand your attention on a daily basis, but one of the most important that can often go by the wayside is cybersecurity. No matter the size of your business, cybersecurity can make all the difference in preserving your organization’s future. While we recommend implementing technology solutions to make cybersecurity easier to manage, without an established culture of cybersecurity, your business will remain at risk regardless of the measure you take to protect it.

0 Comments

Cyberattacks are Happening Faster with Less Time for Early Detection

Cyberattacks are Happening Faster with Less Time for Early Detection

In what sounds like a positive shift, cybersecurity experts have announced their research has found that cyberattacks are spending less time on the networks they infiltrate. Unfortunately, this isn’t such a clear-cut positive. Today, we’ll discuss “dwell time” and how less of it is a problem. 

0 Comments

Defining Penetration Testing and How It Can Help Your Business

Defining Penetration Testing and How It Can Help Your Business

One of the most valuable things for a business to know, in terms of its cybersecurity, is how vulnerable it is to breaches and exploits. This kind of information can be gathered via a process called penetration testing, or pen testing. Let’s go over how the average pen test is conducted to see how these insights are collected.

0 Comments

The Existential Problem with Continued State-Sponsored Cyberattacks

The Existential Problem with Continued State-Sponsored Cyberattacks

Cyberattacks have been carried out by nations for decades, but for whatever reason, our minds still build the hoodie-wearing cyberpunk sitting at a laptop in a dimly-lit room. This often isn’t the case. Today, we thought we would shine a light on state-sponsored hacking, starting with the attack carried out recently against the U.S.-based cybersecurity company FireEye.

0 Comments

Security Tips That Will Help You Hold Your Own

Security Tips That Will Help You Hold Your Own

Despite all the attention we try to direct toward cybercrime and awareness of the risks out there today, hacks and scams are still impacting businesses. With so many professional duties and activities carried out online, your business’ cybersecurity needs to be considered paramount. Here, we’ve listed six things to prioritize in your business to help protect it from such activities.

0 Comments

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Huge Cybersecurity Breach Affecting Major U.S. Organizations is the Biggest One Yet

Honestly, it shouldn’t be surprising that 2020 has come to an end with news of a massive cyberespionage attack—the biggest ever, as a matter of fact. Let’s dive into what we know, and what it signifies.

0 Comments

You’ll Need to Do Better Than Just a Firewall

You’ll Need to Do Better Than Just a Firewall

When dealing with IT, there are often misconceptions as to what some parts of an IT infrastructure does. Firewalls are a prime example, as many believe that a firewall is the catch-all for all bad things coming in from outside the network. This month we will discuss why this isn’t the case, and tell you what you really need to secure your business.

0 Comments

The Four Corners Your Network Security Needs to Cover

The Four Corners Your Network Security Needs to Cover

Network security is paramount to a business’ success with the number of security incidents and data breaches that could potentially upend it. While this sounds like a task of marginally epic proportions, managing your security can be greatly simplified via a few basic activities. Let’s go over four such security-boosting actions that you should direct your attention to.

0 Comments

Cybersecurity Has Also Felt the Influence of COVID-19

Cybersecurity Has Also Felt the Influence of COVID-19

While businesses have always needed to focus on their data security, the COVID-19 pandemic has only made this more of a challenge. Let’s go over why this is, and how many industries (especially the healthcare industry) have had to adjust as a result.

0 Comments

Blog Archive

2012
January
February
March
April
May
June
July
August
September
October
November
December
2011
January
February
March
April
May
June
July
August
September
October
November
December
2010
January
February
March
April
May
June
July
August
September
October
November
December
2009
January
February
March
April
May
June
July
August
September
October
November
December
2008
January
February
March
April
May
June
July
August
September
October
November
December
2007
January
February
March
April
May
June
July
August
September
October
November
December

Mobile? Grab this Article

QR Code

Contact us

Learn more about what Ferrum Technology Services can do for your business.