Contact us today!
(954) 575-3992
facebook linkedin Business Solutions & Software Group RSS Feed

Business Solutions & Software Group Blog

Business Solutions & Software Group has been serving the Coral Springs area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Ransomware is On the Rise Again, and It’s More Dangerous Than Ever

Ransomware is On the Rise Again, and It’s More Dangerous Than Ever

Ransomware is a threat that has seen exponential growth in recent years. We have witnessed it grow from a minor annoyance to a considerable global threat. Even the U.S. Justice Department has issued a declaration that they would begin investigating ransomware in much the same way that they would terrorism cases. Let’s take a look at how this policy could change the way your business should respond to these threats.

Continue reading
0 Comments

Three Cybersecurity Issues for Businesses to Prepare For

Three Cybersecurity Issues for Businesses to Prepare For

Running a business of any size comes with more than its fair share of risks, particularly if that business is on the smaller side. One major risk factor is the prospect of cybercrime and the impact it can have on a business. Let’s look at how this particular risk can influence the challenges that businesses must now contend with.

Continue reading
0 Comments

The Cybercrime the Small Business Needs to Plan For

The Cybercrime the Small Business Needs to Plan For

For the small, but growing business, there are a lot of risks that could potentially harm their ability to stay in business. One of those risks comes in the form of cybercrime. Over the past several years, small and medium-sized businesses (SMBs) have improved the ways in which they combat cybercrime. Let’s take a look at some of the problems SMBs have to deal with.

Continue reading
0 Comments

Macs Are Not Immune to Cybersecurity Threats

Macs Are Not Immune to Cybersecurity Threats

It’s a common myth that Apple computers don’t get viruses. It’s not uncommon for a Mac user to chime in and say, “you should have gotten a Mac,” when a PC user mentions getting a virus or malware. 

Let’s unpack this myth, and talk a little about how, no matter what technology you have, you need to protect it.

Continue reading
0 Comments

Don’t Let Your Network Be Infected Thanks to Coronavirus

Don’t Let Your Network Be Infected Thanks to Coronavirus

Ever since it first popped up in the Wuhan Province of China, COVID-19 (better known as the coronavirus) has created quite a stir—bordering on panic—around the world. Unfortunately, as has been the case many times before, cybercriminals have been using this near panic to support their attacks. Let’s review some of the ways they do so, and how you can protect yourself and your business from these efforts.

Continue reading
0 Comments

Major Data Breaches of Q2

Major Data Breaches of Q2

With data starting to be treated more like a commodity, companies are spending more time and money attempting to secure the data they have. Some organizations aren’t successful. In 2018, over 446.5 million records were exposed, even as data breaches dropped by 23 percent to 1,244. Back in early May we took a look at data breaches over the first four months of the year. Today, we update this list.

Continue reading
0 Comments

Here’s a Malware Refresher

Here’s a Malware Refresher

Security threats are commonplace in the business environment, as any organization that turns a profit is sure to hold valuable data that is of use to criminals. Some people have an easier time identifying threats than others, but with so many different types of threats out there, it’s no wonder that some have trouble handling these scenarios. Here is a guide on some of the more common types of malware, as well as what you should do to avoid a dangerous run-in with it.

Continue reading
0 Comments

NSA-Developed Malware Used in Third-Party Hack

NSA-Developed Malware Used in Third-Party Hack

Have you ever wondered what happens when hackers gain access to state-developed malware tools? Well, now you don’t have to; a type of malware called Double Pulsar, that has been utilized in the past by the NSA, was bundled with a Chinese hacking tool and used to carry out attacks on Hong Kong and Belgium in 2016. Needless to say, this threat is unnerving.

Continue reading
0 Comments

Spreading Botnet has Years-Old Flaw to Thank

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems, if a patch has been successfully developed. Unfortunately, the recent spread of the BCMUPnP_Hunter botnet is evidence that not enough people are appropriately patching their systems.

Continue reading
0 Comments

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

Continue reading
0 Comments

Email Malware is the New Schrӧdinger’s Cat

Email Malware is the New Schrӧdinger’s Cat

There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the experience of a cat. While Schrӧdinger’s cat was initially intended to demonstrate a very different phenomenon, it can also be applied to something that all businesses need to consider: their email security.

Continue reading
0 Comments

20-Year-Old Exploit Finds New Life as ROBOT

20-Year-Old Exploit Finds New Life as ROBOT

There is no shortage of threats on the Internet, from situational issues to deliberate attacks meant to damage your company or steal your valuable data. While new threats pop up almost every day, some have been around for some time--so long, that many seem to not consider them as viable threats.

Continue reading
0 Comments

A DDoS Attack Hits Your Productivity and Profits

A DDoS Attack Hits Your Productivity and Profits

How quickly could your business recover if it were suddenly hit by a Distributed Denial of Service, or DDoS, attack? Are you protected against the effects they could have on your operations? If asked these questions, most businesses should want to say yes, but in reality, over half lack the means to defend against DDoS.

Continue reading
0 Comments

What It Means To Disinfect Your Computer

What It Means To Disinfect Your Computer

We have no problem going on the record as saying that there are more than enough strains of malware to go around. As such, it’s important that you know what to do if your workstation is struck by an infection.

Continue reading
0 Comments

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

Continue reading
0 Comments

Don’t Assume Your New Device is Free of Malware

Don’t Assume Your New Device is Free of Malware

Imagine that, despite the extreme care you took to avoid threats from infecting your devices, they turned out to be infected anyway. However, what if the device had been infected before you had even gotten your hands on it?

Continue reading
0 Comments

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

This Malware Only Needs 2 Minutes to Turn a Security Camera Into a Zombie

There are billions of devices that now connect to the Internet, even devices that may seem to not have any practical reason to do so. However, there is a new type of malware that uses these devices to perform attacks on the networks of all types of organizations: Mirai.

Continue reading
0 Comments

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

Alert: Largest Recorded Breach of Android Nets Hackers a Big Pay Day

A previously known malware called Ghost Push now has a component that has caused countless problems for over a million Android users. This component, called Gooligan, is the source of the trouble, and it adds to this chaos by infecting over 13,000 new devices every day.

Continue reading
0 Comments

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

Alert: New Mobile Malware Spreads via Twitter and Takes Over Your Phone

There are countless threats out there that can mean danger for your business, but one of the most innovative to date utilizes a malicious Twitter account to administer commands to a botnet made up of infected Android devices. In fact, this is widely considered the first threat to actively use a social network in this manner, making it a wake-up call for security professionals and social media users alike.

Continue reading
0 Comments

Did You Know Early Ransomware Spread via Floppy Disk?

Did You Know Early Ransomware Spread via Floppy Disk?

Ransomware might be a relatively new player in the battle for the Internet, but its short history shouldn’t belittle the damage that it can do to both businesses and users of personal computers. Perhaps you’ve had the misfortune to encounter it for yourself, and your files were locked down because of it. Regardless, ransomware is now a prevalent part of the online crime scene, and people are using it to extort money from innocent users, making it a considerable threat.

Continue reading
0 Comments

Latest News

Our Site Has Launched!

flag

Welcome to Our New Site!
We are proud to announce the unveiling of our new website at Business Solutions & Software Group!

Read more...

Contact Us

Learn more about what Business Solutions & Software Group can do for your business.

callphone

Call us today    (954) 575-3992

10211 W Sample Road
Suite 114
Coral Springs, Florida 33065

facebook linkedin #