FAQ Category: Network Security and Data Protection Solutions

What are the Different Types of Hacking?

Hackers can access your passwords in a multitude of different ways. The most common methods are shoulder surfing, social engineering, dictionary attacks, and just attempting to guess passwords from information about the user that’s available to them. Email hijacking is widespread. Hackers, spammers, and social engineers taking over control of people’s email accounts (and other […]

What are the Risks of Rogue Access Points?

A rogue access point very well could be installed by an employee who has good intentions, but there is also a chance that one has been added by a malicious attacker. Rogue access points can create a vulnerability in an organization’s network which leave companies open to DoS and data theft attacks. If a rogue […]

What is a Rogue Access Point?

In this day and age, network security is of the utmost importance. This is why rogue access points should be found and dealt with accordingly. A “rogue access point” is a wireless access point that has been added and installed on a secure network without the network administrator’s explicit permission.

Is My Data Storage Protected in the Event of a Disaster?

Not necessarily. The safety of your data is dependent upon a number of different factors from storage methods, firewalls, encryption, backups, how your company’s users are accessing the data, and a host of other variables. Data protection is defined as the safeguarding of your organization’s important information from corruption, compromise, or disaster-induced loss. It is […]

How does a Hybrid Cloud Increase Security?

Security in a hybrid cloud model is increased when organizations leverage both the security of a private cloud and the speed and services of a private cloud. Although public cloud providers go to great lengths to protect the data of their clients, a public cloud is inherently more open and vulnerable than a private cloud […]

We are a Small Company So Why Do We Need to Protect Against Ransomware?

Ransomware is a major security threat to all businesses and individuals. Ransomware doesn’t discriminate on organization size. Contrary to popular belief, large companies are not the only targets of ransomware and small-to-mid enterprises are not immune to attacks. Small businesses lose close to $1 billion each year due to ransomware and that number is growing […]

How Does Ransomware Spread?

80% of ransomware spreads via email; however, an unsuspecting victim can become infected by visiting malicious websites and other methods. A person can download a file or open an attachment that has been compromised with malware. People are also often infected by malvertising, which is malicious advertising. Malvertising requires little or no interaction from the […]

What Do I Do in the Event of a Ransomware Attack?

Besides calling Storcom’s Ransomware Recovery team of experts, businesses need to follow their ransomware removal protocol after they have been impacted by ransomware. If your organization does not have a plan in place, then Storcom can help you create your own Ransomware Prevention and Recovery Roadmap™ prior to a ransomware attack. Ransomware prevention is key […]

What are the Types of Ransomware?

There are two types of ransomware being used today. The first, and most common, is crypto ransomware which encrypts personal files and data. The second is locker ransomware which is designed to lock a user’s computer in order to prevent victims from using it. Users may see an image on the screen or instructions that […]