{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '0' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Are your toys listening to you? Smart toy cyber-security concerns

 

As the holidays draw closer, kids are keeping their fingers crossed that they will wake up to the newest and coolest toys the market has to offer. Toy manufacturers are now producing "smart toys" that can interact with kids like never before.

5 Network Security Risks to Prepare for | Types of Cyber Attacks

Network security is becoming more necessary as attacks become more sophisticated and diverse. Accessing the network of an organization is a gold mine for hackers. Once a network is breached, there many different types of cyber attacks that the cyber criminals can employ to disrupt your organization's operations. Encryption of precious files, stealing of personal information, and impersonating executives in a phishing attack, are just a few of the tactics that these criminals employ. So what can you do when it comes to network security? You have to protect all entry points from these attacks. Specifically, we recommend considering the following five network security threats when preparing against such attacks.

Pine Cove Consulting Given National Cyber-Security Award


(Pictured above: Brandon Vancleeve getting interviewed about the award)

Pine Cove Consulting was awarded another national partner award from its industry leading partner, Sophos, for their work in the cyber-security industry. Sophos announced on November 1st that Pine Cove Consulting was Sophos' Synchronized Security Partner of the Quarter for quarter two of 2017. The criteria for this award was based on a combination of understanding and use of Sophos' Synchronized Security and accreditation from Sophos' training and certifications. Along with this honor, Pine Cove was given a Sophos branded Yeti SB5 Mountain Bike which is the same type of mountain bike that has won the last two mountain bike world championships.

Why Mobile Device Protection is Important | BYOD Security Risks

When people think cyber-security, they think endpoints, networks, servers, firewalls, etc. Mobile devices hardly make the top of the list, but maybe they should. With the rise of the BYOD (bring your own device) organization culture, organizations are being flooded with new devices into their network constantly.

Government bans Kaspersky Lab antivirus software. What does this mean for you?

(Image Courtesy of engadget.com)

You may have heard the recent news but if you haven't it could have implications for you and your organization. Secretary of Homeland Security Elaine Duke issued a "Binding Operational Directive (BOD)" on September 13th which directed Federal Executive Branch departments and agencies to remove any security products, services, and solutions associated directly or indirectly with Kaspersky Lab or related entities.

Anaconda School District Kicks off New Year with Technology Upgrade for Students, Faculty and Staff

BOZEMAN, Montana —In an effort to modernize and improve efficiency and education, Pine Cove Consulting assisted the Anaconda School District to completely upgrade its technology by implementing enterprise-level wireless infrastructure, Chromebooks for the students and cyber-security protection for all staff, administration and students.

3 Phishing Attack Examples | Types of Cyber Attacks

The threat of phishing attacks is not new, but is growing. In fact, according to Symantec, one in 131 emails contain malware, which is the highest rate we have seen in over 5 years. It is also estimated that phishing emails target over 400 businesses every day which have led to an average of a $1 billion loss over each of the last 3 years. According to a study done by PhishMe, 91% of cyber attacks now begin with some sort of phishing email. Phishing is clearly is one of the favorite tools hackers use to initiate all the types of cyber attacks.

Introduction to Deep Learning Security

Cyber-security is a fast developing industry. As hackers become more and more sophisticated with all the types of attacks, so too must the protection offered by cyber-security companies. Sophos security is set to unveil their new deep learning technology this fall which will take the company's cyber-security solution to new heights. To understand the magnitude of this protection we will do an introduction to deep learning technology and explain how it works.

3 Major Types of Cyber Attacks | Descriptions, Examples, Prevention

Your organization has either; BEEN attacked, is currently BEING attacked or WILL BE attacked by cyber criminals.  Our mission is to provide you the knowledge, the vision, and the solutions to secure your assets. With cyber-attacks becoming more and more prevelent in recent months (Petya, WannaCry, Google Phish), businesses, schools, and organizations alike are scrambling to find the right way to secure their assets.

Another Worldwide Ransomware attack, Petya, Spreading Now

The Petya ransomware. Courtesy of Wired.co.uk

(Follow this page as we will keep it updated as we know more)

Just one month after the WannaCry attack in May, the world is now experiencing another worldwide ransomware attack. The WannaCry attack spread quickly across the world as hackers infected hundreds of thousands of computers and demanded a ransom from those infected. This new ransomware attack is expected to have similar, or even greater, damage.

Recent Posts

Popular Posts