April 15th, 2019 | By Administrator
Point Of Sale Security Guide Introduction North Country Business Products, Inc. was a recent target of a cyber attack according to Fox 10 news. Their business partners fell victim to a data breach. The attack started between January 3 and January 24, 2019. The attack stole t...
MORE
April 8th, 2019 | By Administrator
Introduction What do BlackPOS, Backoff, and Bernhard POS have something in common? They are all notorious POS malware. So how does malware work? POS malware will scan for active processes in your computer’s memory or RAM. It will then scrape or extract information out of the...
MORE
April 3rd, 2019 | By Administrator
Introduction In today’s business setup, you can see people bringing their own electronic devices at work. People use their own laptops, tablets, and smartphones to do work. This is what a BYOD or “Bring Your Own Device” environment looks like. This kind of work environment i...
MORE
April 1st, 2019 | By Administrator
The Benefits Of Application Whitelisting Introduction Have you ever been in an event where you can’t enter because your name is not on the list of participants? You forgot to register in your excitement to attend this event. This scenario is very similar in conce...
MORE