Welcome to the Vircom Blog!

5 Social Engineering Accidents Waiting to Happen

5 Social Engineering Accidents Waiting to Happen

Posted on 28 April 2016 at 09:17
By: George Stamatakos   Social engineering is the act of manipulating others to get them to break a security process or divulge confidential information. This is something that hackers are really good at it. They are prime at taking advantage of the good-naturedness and trusting tendencies of people to create a security breach within an organization or to get them to compromise their...
Read More No Comments
Hook, Line and Sinker:  Snagging Victims Phishing

Hook, Line and Sinker: Snagging Victims Phishing

Posted on 26 April 2016 at 10:27
By: Jason Carreiro This tax season, the IRS has seen a surge of 400% in phishing emails and malware. Businesses beware, tax season is the most popular time for cybercriminals to push their phishing scams.   These criminals impersonate the IRS in emails hoping to gain personal and financial information from corporations. They try to encourage the recipient of the phishing scam to...
Read More No Comments
Patch solutions: When is it time to invest in an automated system?

Patch solutions: When is it time to invest in an automated system?

Posted on 21 April 2016 at 17:12
By: Yves Lacombe With software development cycles accelerating and an onslaught of software patches released weekly, it's a challenge to find the time and resources you need to keep your network up to date. As most IT managers and admins know, there comes a time in most scaling environments to move from manual workflow to automated processes. Software patches are definitely in that category...
Read More No Comments
3 Plugins to Update or Dump Now!

3 Plugins to Update or Dump Now!

Posted on 19 April 2016 at 10:13
By Yves Lacombe   Plugins with security vulnerabilities are optimal targets for hackers to exploit to take over a user’s computer. Keeping plugins up-to-date with the latest patches is critical to protecting and preserving your data. But what if there is no security patch? What should you do? Easy. Dump it, now!   Here are three plugins that fall into the red alert category...
Read More No Comments
Just Found A USB Stick? Don’t Be So Quick to Plug It In

Just Found A USB Stick? Don’t Be So Quick to Plug It In

Posted on 14 April 2016 at 09:22
BY: Jason Carreiro Taking his usual route home, John catches a glimpse of a shiny object. He stops and picks up the USB stick. Perhaps he is thinking that he can find the owner and return it. He gets home and plugs it in. Unaware, he just infected his computer with malware.   A Dangerous Liaison USB sticks appear as convenient small devices. The purpose of these devices is to store...
Read More No Comments
5 Common CIO Mistakes to Avoid to Bring Value to the Business

5 Common CIO Mistakes to Avoid to Bring Value to the Business

Posted on 12 April 2016 at 09:07
By George Stamatakos Mistakes happen, and no one is immune. As smart as any CIO might be, if they haven't experienced a gut-turning error, they haven't been in the job long enough. And while high-level errors are a danger across the C-suite, the CIO finds his or herself in an area of particular sensitivity and low error tolerance. Add to that the high demands of the job and a virtual jungle of...
Read More 1 Comment
Easy Targets? Why are Healthcare Organizations Falling Prey to Ransomware

Easy Targets? Why are Healthcare Organizations Falling Prey to Ransomware

Posted on 07 April 2016 at 09:37
The recent rise of ransomware attacks on healthcare organizations is drawing plenty of attention. Dozens of healthcare organizations have been targets. Reports show that hospitals in the US, Canada and Germany have fallen prey to ransomware attacks.   Ransomware is No Longer a Click Away The latest ransomware no longer requires a user to click a link embedded in an email or a malicious...
Read More No Comments
Need to Create a Shared Mailbox in Exchange 2016? Here’s Help!

Need to Create a Shared Mailbox in Exchange 2016? Here’s Help!

Posted on 05 April 2016 at 09:20
  Creating a shared mailbox for various corporate communications with Exchange 2016 has never been easier. A shared mailbox allows a group of users to send emails from a common mailbox without displaying the user’s individual email address. In just a few minutes, a shared mailbox for the support, sales, marketing team or for general inquiries can quickly be set up.   If your...
Read More No Comments
Using Security Zones to Protect Your Network Against IoT Security Risks

Using Security Zones to Protect Your Network Against IoT Security Risks

Posted on 31 March 2016 at 09:36
  The Internet of Things (IoT) is an emerging industry with the expectation that by 2020, we will have 30 billion connected devices. Because IoT is relatively new, there are concerns about the lack of security. In the product design, many security threats exist that could bring a network to its knees.   Protecting a network against security risks is key to keeping a business...
Read More No Comments
Feeling Exposed? With the Internet of Things (IoT), You Soon Will Be

Feeling Exposed? With the Internet of Things (IoT), You Soon Will Be

Posted on 29 March 2016 at 09:26
  The Internet of Things (IoT) is gaining visibility. The ability to connect and manage devices via the Internet is an emerging technology frequently talked about in the media and businesses. The excitement and business opportunities are there, but some of the visibility and discussions taking place are not always positive. A growing issue is IoT security challenges. Some security...
Read More No Comments

Questions? Call us.

Speak with Security Expert Engineers to learn more about how Vircom can help your Business IT Security.

1-888-484-7266

Request a demo.

Schedule a demo to talk to a Security Expert Engineer about your specific needs.

Request a demo

Start a free trial.

Test drive the full Vircom experience, free for 30-days. Get started today!

Start a trial

Free Trial Free Email Security Grader