How Cloud Computing Can Benefit Small Businesses

Accounteks ConsultingNews

When starting a business, servers and networking equipment can be a significant expense. To reduce this burden, many businesses are turning to cloud computing. Cloud computing provides a number of benefits including improved scalability, cheaper support, and automated backups. As a result, you have more time and energy to spend on other business needs. Here is an overview of what … Read More

5 Ways to Protect Your Web Browsing Data Now That ISPs Can Sell It

Accounteks ConsultingNews

If you live in the United States and you are using a U.S.-based Internet service provider (ISP), you need to know about an important change made to Federal Communications Commission (FCC) rules. In April 2017, U.S. lawmakers repealed several FCC rules that would have required ISPs to get customers’ consent before selling their web browsing data to advertisers and other … Read More

Locky Ransomware Is Back in a Big Way

Accounteks ConsultingNews

After taking a brief hiatus, cybercriminals launched four new Locky ransomware attacks in August 2017. The biggest one occurred on August 28. In a span of just 24 hours, hackers sent out more than 23 million malicious emails, making it one of the largest malware campaigns in the latter half of 2017, according to AppRiver security researchers. The Phishing Emails … Read More

This Tech Support Scam Can Trick You into Calling a Fake Hotline

Accounteks ConsultingNews

Your phone rings. As soon as you say “Hello”, the caller identifies himself as a tech support staff member from a well-known tech company. He tells you that he has detected a serious problem on your computer, which you need to fix immediately.Sound familiar? Most likely it does, as tech support scams have been around for many years. However, some … Read More

How Former Employees Can Pose a Big Threat to Your Data

Accounteks ConsultingNews

Data breaches instigated by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant threat to companies’ data as well as their bottom line, as the following examples demonstrate: Over a two-year period, the co-owner of an engineering firm accessed the servers of his former employer (also an … Read More