Category Archives: Security – News and General

Undetectable Phishing Attack Serious Risk for Chrome, Firefox, and Opera!

Phishing Attack, Enstep, Houston IT Services, TX

Chances are you and your employees use one or more of these very popular web browsers: Chrome, Firefox, and Opera. If so, you need to know about a very dangerous phishing attack that’s currently making its rounds. It’s dangerous because it’s nearly impossible to detect by even the savviest Internet users. Hackers are using it to […]

Also posted in Security | Tagged | Leave a comment

Drones and Big Data Security Issues

Drones and Big Data Security Issues, Enstep, Houston IT Solutions

Drones have altered the world in significant ways over the last several years. They have made so many things much, much easier- from national security issues to getting the perfect commercial video footage to photography and personal uses. One area they are revolutionizing is the collection of Big Data, but not without ramifications for security. […]

Also posted in (Tech) Security, Business Technology, IT Consulting, Security | Tagged , , | Leave a comment

Gmail Hack: Don’t Fall Prey to This Smooth Phishing Attempt

Gmail Hack: Email Phishing, Houston IT Solutions, Enstep

Hackers routinely use phishing as a method of acquiring sensitive information from unsuspecting victims. This information is then either sold or used to commit identity theft. There is a particularly dangerous phishing attempt currently targeting Gmail accounts. More and more businesses are using Gmail accounts for their professional email, making it extremely important to be […]

Also posted in Security | Tagged , | Leave a comment

Intro to Adaptive Security Architecture

Intro to Adaptive Security Architecture

There is a disconnect inherent between business and security objectives for today’s businesses. While business is postured to grow, improve, take risks, and always move forward, security seeks to protect, control, ensure compliance, and mitigate risk. With the widening of this gap and the ever smarter, stronger, and more sophisticated pool of cyber criminals, it is […]

Also posted in (Tech) Security, Enstep Services or Products, General Tech, News, Security, Uncategorized | Tagged , , | Leave a comment

Your 2016 Complete Guide to Password Security

Password Security

Password Security is More Important than Ever Hacking is not an exaggeration. It’s become a major enterprise with billions of dollars stolen from financial institutions. Also, companies are hacked for proprietary information which thieves will sell to competitors. The media mentions all of the major hacking instances but many small and medium-sized businesses are at […]

Also posted in (Tech) Security, Security | Tagged , , , , , , | Leave a comment

Top Tips For Staying Safe Online

Staying safe online has become one of the biggest problems in our time and age given the amount of phishing scams and viruses there are. The internet is full of dangers that lurk around all the time. A person who has experience in searching knows how to protect themselves from the danger but someone who […]

Also posted in (Tech) Security, Security, Tech Tips | Tagged , , , | Leave a comment

How to Keep Your Data and Computer Safe While Traveling

Many senior business leaders travel regularly as part of their work. This means that they are often conducting business from connections that are less protected than what would be desired. A while back, the risk while traveling was limited to what documents could be stolen from a hotel or brief case, but now the risk extends to online […]

Also posted in Education, News, Security, Tech Tips | Tagged , , , | Leave a comment

Security Warning: Adobe Flash Contains Major Security Defect

  Adobe Released last week that Adobe Flash contains a security vulnerability. This effects Flash on all versions of Windows, Macintosh, and Linux operating systems. If the vulnerability is exploited, it can cause the system to crash leaving it susceptible to targeted attacks. dobe has categorized this vulnerability as critical.   The Affected Software Versions […]

Also posted in (Tech) Security, General Tech, Security | Tagged , , , | Leave a comment

T-Mobile Database Hacked

Database of 15 Million Consumers Hacked at Experian Did you apply for a new post paid connection from T-Mobile last month? If yes, then you have cause for worry as hackers have accessed data of nearly 15 million consumers who had applied for a phone connection with T-mobile. Experian happens to be the vendor appointed […]

Also posted in (Tech) Security, News, Security | Leave a comment

Cloud Computing Security Standards: ISO 27018 One Year In

One of the major concerns that businesses and individual alike have with cloud storage and computing is security. Will my files be safe? Where will they be stored? These are all legitimate questions, and though we hear of many security failures and hacks in the news, cloud computing is an ever evolving technology that proves to have greater benefits than the potential […]

Also posted in (Tech) Business Continuity, (Tech) Security, Cloud Services, Education, General Tech, Security | Tagged , , , , , , , | Leave a comment
Are you affected by the Kaseya mining scandal?
Read More