Identifying the Top 4 Network Security Risks

November 15th, 2018 by admin

Security for your business is crucial. Everyone knows that, but settling for any old security system won't give you the protection you need against modern-day cybercriminals stealing sensitive data and monitoring operations. MPA offers great network security solutions for your business, no matter the...
Read Full Story »

Posted in: Cyber and Data Security,

Unique IT Challenges Financial Services Providers Face Today

June 19th, 2018 by admin

Financial services providers find their IT challenges list is always growing because of security issues, employee needs, customer protection, regulatory laws and business requirements. Keeping up with IT concerns is important not just because failing to do so means lost business opportunities — but also,...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

The Mirai Botnet Returns — and Why You Should be Concerned

March 13th, 2018 by admin

The Mirai botnet refers to a massive-scale network of Linux-running Internet of Things devices turned into remote-controlled bots through a malware infection. Hackers can use the network to run a distributed denial of service, or DDoS, by having the infected devices overwhelm a target with data traffic....
Read Full Story »

Posted in: Cyber and Data Security,

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking down on many common threats, hackers are finding new...
Read Full Story »

Posted in: Cyber and Data Security,

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses in the survey aren't claiming to have exceptional...
Read Full Story »

Posted in: Cyber and Data Security,

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry receives a whopping 15 percent of all ransomware...
Read Full Story »

Posted in: Cyber and Data Security, Partners and Industries,

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised security at least once for 79.2 percent of businesses...
Read Full Story »

Posted in: Cyber and Data Security,

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different form of cyber-threat plaguing businesses over the...
Read Full Story »

Posted in: Cyber and Data Security,

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission that they're virtually powerless to stop it. Mostly...
Read Full Story »

Posted in: Cyber and Data Security,

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's nothing wrong with sticking with "obsolete" hardware...
Read Full Story »

Posted in: Hardware and Software,

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed headlines: In January, Israel's Electricity...
Read Full Story »

Posted in: Cyber and Data Security,

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. On March 4, researchers at security firm Palo Alto...
Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of time and finances. It’s estimated that businesses...
Read Full Story »

Posted in: Cyber and Data Security,

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned never to feed bears and other wildlife—because...
Read Full Story »

Posted in: Cyber and Data Security,

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email links and shady websites. But there's a bigger threat...
Read Full Story »

Posted in: Cyber and Data Security,

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover you've still been hacked? An insurance policy...
Read Full Story »

Posted in: Cyber and Data Security, Solutions,

'Tis the Season—for Small Business Cybercrime. Here’s How to Protect Your Company

January 7th, 2015 by admin

The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S. "Targeting" Target—via Small Businesses You may have seen a segment on the November 30 broadcast of 60...
Read Full Story »

Posted in: Cyber and Data Security,

Beware Email Spoofing! Protect Yourself Now!

April 4th, 2014 by admin

We have recently seen a rise in a disturbing phishing scam called email spoofing. Email Spoofing A spoof email is an email that looks as if it came from a trusted friend or acquaintance, but is actually malicious in nature. These emails are particularly nasty because they really look like they are...
Read Full Story »

Posted in: Cyber and Data Security,

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our clients be up-to-date on this issue and understand...
Read Full Story »

Posted in: Cyber and Data Security,

Quiz - Can you Find the Malicious Email?

December 12th, 2013 by admin

Can you Spot the Malicious Emails/s?! After reading through our Cryptolocker and Ransomware blog series and learning how to identify a malicious email, it's time to put your new virus sleuthing skills to the test. Read through the list of email subject lines and from names below.  Which email/s...
Read Full Story »

Posted in: Cyber and Data Security,

How to Identify a Malicious Email

December 4th, 2013 by admin

Continuing our blog series about Cryptolocker and Ransomware virus attacks, it is necessary we explain the basic fundamentals of identifying a malicious email or attachment. Only through education and proper awareness can we effectively avoid Ransomware and other malware attacks. Identifying a...
Read Full Story »

Posted in: Cyber and Data Security,

The Single Most Reliable Method for Preventing a Ransomware Attack

December 3rd, 2013 by admin

Last week, we wrote about the rise of Cryptolocker and Ransomware viruses, the new breed of malware virus infecting host computers through malicious email attachments, and spreading rapidly through its use of commercial-grade RSA encryption and Bitcoin, a universal, virtual currency. Unfortunately,...
Read Full Story »

Posted in: Cyber and Data Security,

Cryptolocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for the recovery and decryption of files, typically...
Read Full Story »

Posted in: Cyber and Data Security,


Back to Top

Copyright © 2019 MPA Networks, Inc.

Atomic8Ball Web Presence Management