Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target stores over the 2013 holiday shopping season.  Now Michael’s Craft Store, the largest arts and crafts dealer in the U.S. suspects it has...

avatar
Duleep Pillai
January 26, 2014
Discover More
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis

Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning is necessary to minimize these risks and protect your valuable data. In today’s technology-driven world, most businesses rely on IT to perform critical operational functions. Essentially, information technology is embedded...

avatar
Duleep Pillai
January 24, 2014
Discover More
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?

Cybercriminals are always looking for weak points in a network system to hack the security system of your business and get confidential information. Some hackers do it for the pleasure of wreaking havoc on security systems, while others do it for financial reasons; regardless of the reason, malicious attacks are an awful experience for businesses....

avatar
Duleep Pillai
January 23, 2014
Discover More
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware

Law Firms and The BYOD Trend: How to Manage Potential Security Risks

Law firms are rapidly adopting the “bring your own device” trend to improve productivity and efficiencies. But there’s a problem — Using BYOD can impact your law firm’s security.  This can be addressed by creating BYOD policies. It’s critical to define your employee rights and appropriate use of mobile devices in order to protect your...

avatar
Duleep Pillai
January 20, 2014
Discover More