News and Views

300+ New Ways to Train Your Users to Think Before They Click

January 18, 2017
Over the past year, we have told you about Security Awareness Training and all of the benefits it provides. Having users who think before they click is one of the most valuable firewalls your organization can invest in. Now we are proud to announce a new level of training with over 300 new ways to keep users from clicking on malicious content. ...

Zero-Day Vulnerabilities Continue to Increase

August 11, 2016
When a vendor releases software, they believe that it’s safe to use and reliable. However, this isn’t always the case. Often there are holes in the software that vendors are unaware of. These can be exploited by hackers and are known as Zero-Day attacks. Types of Zero-Day attacks include malware, spyware, and openings in your private information. Aft...

Proofpoint Shares First Quarter Top Threats and Trends

June 22, 2016
Each quarter, our partners at Proofpoint release a threat summary report. What are some of the biggest threats of 2016? Read the first quarter report to learn more and prepare your organization for the rest of the year.  Click here to view the report in its entirety. Highlights: Multiple threats continue to target your email inbox ...

LinkedIn Data Breach Appears to be Worse than Expeted

May 24, 2016
Back in 2012, over 6.5 million LinkedIn users fell victim to a data breach. During this breach users' login info (usernames and passwords) were stolen. New information has been discovered stating that over 100 million records may be compromised and LinkedIn has begun emailing users to let them know they should change their passwords.  This ha...

Critical Info: Cryptolocker Malware - Holding Data for Ransom

April 13, 2016
You may have heard about CryptoLocker or Ransomware over the past couple of years. If you're subscribed to any Yeo & Yeo Computer Consulting newsletters or e-alerts, you may have seen our articles on CryptoLocker before. CryptoLocker has continued to infect computers worldwide while baffling leading IT security experts. A recent article on the...