Late last week we learned about a massive ransomware attack being referred to as ‘WannaCry.’ This attack is affecting more than 200,000 victims in 150 countries, including factories, hospitals, small businesses and schools. Although this particular attack has been more common internationally, this does not mean you should take it lightly. The main cause of
While the Internet of Things (IoT) has merged the physical world with the digital world to increase convenience and efficiency, hackers have also taken the initiative to exploit its vulnerabilities, often caused by the third-rate design of some connective devices. Door locks, thermostats, refrigerators, security systems, cameras, and printers are among the IoT devices that
This Wednesday, an advanced and convincing computer attack disguised itself as a shared Google Docs message, infiltrating and infecting many news agencies and other institutions systems across the U.S. Mimicking a Google Docs message, it was sent from a source that looks familiar to most users, such as a friend or colleague. After clicking on
To kick off Small Business Week, Saalex Solutions, Inc. was awarded a Certificate of Appreciation from Kennedy Space Center (KSC) for their contributions to the Agency’s Small Business Program. KSC Small Business Specialist Joyce C. McDowell presented the award to Saalex President and CEO, Travis Mack, at the company’s Rockledge, Florida location. The presentation also
Saalex Information Technology, LLC (SaalexIT) is proud to announce Zuber Lawler & Del Duca LLP (ZLD) as featured customer of the Month for May 2017. ZLD is a boutique, full-service business law firm of approximately 45 lawyers, headquartered in Los Angeles with Chicago, New York and San Jose offices. The Firm focuses on complex domestic
According to IBM, more data has been created in the past two years than ever before, with an estimated 2.5 quintillion bytes shared every day. With social media and online shopping, personal information is being shared every second of every day. So what happens if you experience a data breach?
First thing’s first, what is “data integrity?” Data integrity is accuracy, consistency, and plenitude of data. This means that the digital information is not corrupted and is only accessible to those authorized to view or alter it. It’s an elementary and essential component of information security. When a database is designed, data integrity is put
It is often thought that MAC operating systems have been protected from viruses. Unfortunately, with the advances in technology and complexity of attacks, no one is safe. According to research by security firm McAfee, there is a 700% jump in the number of malware threats to Mac OS systems compared to the previous year. Statistics
Want your mobile device to be safe from all sources of malware and viruses? As mobile devices have become the primary tool of communication, cybersecurity is becoming more valuable, especially since mobile devices contain personal information. Learn the basics on how you can protect your smartphone from being hacked in this week’s video blog.
With millions of cyber attacks occurring each day, how are you protecting your company’s data from inside threats? Do you limit your employees access to certain sites? Learn more about how to combat inside threats in this week’s video blog.