CLIENT SUPPORT: 678-822-5818
  • Support Portal
Contact Us At 678-775-6777
Zanacore Technologies
  • Home
  • Is This You?
  • Services
    • NetGuard
    • Backup & Disaster Recovery
    • IT Consulting
      • Security
    • VoIP
    • Email & Spam Protection
    • Hardware as a Service
    • Cloud Services
    • Office 365
  • Why Zanacore?
  • Free Stuff
    • Blog
    • White Papers
    • Newsletter
    • Security Assessment
  • Our Clients
    • Testimonials
  • About Us
    • Partners & Certifications
    • Referral Program
    • Contact Us
    • Support Portal
    • Careers
  • Home
  • Is This You?
  • Services
    • NetGuard
    • Backup & Disaster Recovery
    • IT Consulting
      • Security
    • VoIP
    • Email & Spam Protection
    • Hardware as a Service
    • Cloud Services
    • Office 365
  • Why Zanacore?
  • Free Stuff
    • Blog
    • White Papers
    • Newsletter
    • Security Assessment
  • Our Clients
    • Testimonials
  • About Us
    • Partners & Certifications
    • Referral Program
    • Contact Us
    • Support Portal
    • Careers

New phishing scam targets Office 365 users

September 15th, 2017 Security 2017september15security_a, microsoft, multi-factor authentication, office 365, spear phishing
New phishing scam targets Office 365 users

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on.

Read more

New Locky ransomware: what you need to know

August 30th, 2017 Security 2017august30security_a, locky, Malware, ransomware, security, trojan
New Locky ransomware: what you need to know

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far.

Read more

Black and white: Not all hackers are bad

August 16th, 2017 Security 2017august16security_a, black hat, cybersecurity, gray hat, hacking, white hat
Black and white: Not all hackers are bad

What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who takes their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.

Read more

What you need to know about malware

July 28th, 2017 Security 2017july28security_a, Adware, cyber security, cyber threats, Malware, ransomware, Spyware, trojan
What you need to know about malware

Did you know that viruses, ransomware, spyware, and trojans are all categorized as types of malware? Having been around for decades, these cyber threats have grown both in number and intensity. Needless to say, it pays to know how each of them works as well as how to protect your business.

Read more

Why Nyetya is more threatening than WannaCry

July 13th, 2017 Security 2017july13security_a, cyber security, Malware, microsoft, nyetya, ransomware, wannacry
Why Nyetya is more threatening than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history.

Read more

Wikileaks details router vulnerabilities

June 27th, 2017 Security 2017june27security_a, cia, firmware, routers, security, wannacry, wikileaks, wireless networks
Wikileaks details router vulnerabilities

Adding to the list of reasons to outsource your network security to a certified IT provider, a recent CIA leak shows just how vulnerable most network routers really are. Read on to learn why this is such a big vulnerability and what you can do to fix it.

Read more

Basic PC fixes are costing you money

June 9th, 2017 Security 2017june9security_a, it budget, personal computers, security, wannacry
Basic PC fixes are costing you money

Security professionals should be beefing up your network security, implementing advanced firewall software, and identifying risks for possible breaches. In reality, they spend a huge chunk of their time troubleshooting issues on individual personal computers (PCs). That workflow is not ideal, but that’s what normally happens in many organizations.

Read more

WannaCry: A historic cyberattack

May 25th, 2017 Security 2017may25security_a, cybersecurity, employee training, Malware, perimeter security, phishing, ransomware, software updates, wannacry
WannaCry: A historic cyberattack

WannaCry is one of the few malware campaigns to become a household name. It’s educated countless people on the reality of ransomware and the vulnerability of their data. If you’re still worried about whether you’re at risk, we’ve collected everything you need to know right here.

Read more

The most advanced Gmail phishing scam yet

May 10th, 2017 Security 2017may10security_a, cybersecurity, fancy bear, gmail, Google, oauth, phishing
The most advanced Gmail phishing scam yet

If employee training and education isn’t an integral part of your cybersecurity strategy, a recent scam might force you to reconsider. Instead of relying on complicated programming code to steal and destroy data, hackers are increasingly relying on human errors to get the job done.

Read more

The phishing craze that’s blindsiding users

April 24th, 2017 Security 2017april24security_a, browsers, cybersecurity, homographs, Malware, phishing
The phishing craze that’s blindsiding users

You pay close enough attention to the links you click to avoid clicking on something like goolge.com or evrenote.com...right? Because if you’re not, you could end up exposing your computer or smartphone to a host of malware. The newest phishing attack strategy is the worst of all, and can catch even the most astute users off guard.

Read more
  • «
  • ‹
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • ›
  • »

Email Newsletter

Subscribe

Recent Posts

  • Protecting against VoIP service theft
  • The cloud conversation SMBs can’t ignore: Bringing UCaaS and CCaaS together
  • AI is great, but it creates a security blind spot
  • Keys to comfort and performance: Choosing the right keyboard
  • AI-powered VoIP to take customer communication to new heights

Categories

Archives

logo_footer

Contact Info

  • 6340 Sugarloaf Parkway
    Suite 200

    Duluth, GA 30097
  • Phone: 770-381-1780

Navigation

  • Home
  • Contact Us
  • Support Portal

  • This field is for validation purposes and should be left unchanged.

©2025 Zanacore Technologies.
All Rights Reserved.
  • Privacy Policy
  • Website by Pronto
  • Privacy Policy
  • Website by Pronto