<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=900254546818932&amp;ev=PageView&amp;noscript=1">
May 29, 2020 (877) 771-2384 sales@wheelhouseit.com Fort Lauderdale · New York · Los Angeles

Cyber Security

How Hackers Use COVID-19 Fears to Spread Malware

While businesses and consumers alike have been concerned about staying healthy and the impact of quarantines and lockdowns on daily life in the wake of the novel coronavirus infection, COVID-19, that has been named a global pandemic, malicious coders have found a way to use those worries to their advantage.

Critical Windows Vulnerabilities Cause CISA and OCR to Issue Emergency Directives

The CISA has, as of January 2020, released an emergency directive that focuses on some critical vulnerabilities affecting all Windows systems, Windows CryptoAPI, Windows Remote Desktop Gateway (RD Gateway), and Windows Remote Desktop Client.

Attention Pulse Secure VPN Users - Are You Still Vulnerable?

CISA, the Cyber Security and Infrastructure Security Agency, has issued a warning to Pulse Secure customers urging them to patch the 2019 Pulse Secure VPN vulnerability, CVE-2019-11510. The vulnerability is being exploited in real world attacks. In this post, we will outline the type of vulnerabilities discovered in these products, and why these issues leave a company particularly vulnerable.

Is Your Business Backed Up and Secure?

With the current threat landscape the way it is, it is essential that business owners do what they can to protect their data. A critical part (but not the only part) of this is to back it up. Today, we will take a look at data backup and explain how it has to be an essential part of your business’ cyber security strategy.

Updating the Latest Major Data Breaches

We’ve tried to keep a detailed record of this year’s largest data breaches. These are the major breaches that have happened this fall.

Fighting Fire with Fire: Automating Cyber Security

When it comes to cyber security, automation can benefit many of your processes and protections. Let’s review how automation can be used to protect your business, and by extension, your livelihood.

When it comes to cyber security, automation can benefit many of your processes and protections. Let’s review how automation can be used to protect your business, and by extension, your livelihood.

Phishing is a Major Threat

Fishing - a jerk on one end of a line waiting for a jerk on the other end.

Being Lazy Will Get You Hacked - Beware of Complacency

Are you one of those people that are able to stay healthy for long periods of time and then  take your health for granted by ignoring minor health issues? Before long an ignored problem can become a major health issue.

Complacency, or sheer laziness...

Cyber Security Tip of the Day: Avoid These Common Cyber Security Mistakes

Cyber security should be one of your top priorities when it comes to your business. Data breaches can come unexpectedly at any time, and the results can be disastrous. Here are four common mistakes to avoid.

1 2 3 4
page 1 of 4
We’re Very Social!