Our Blog

View all blog posts
Oct 18, 2019
Who Clicked? The Story of Lori Lori got a message from a common banking app...
Category: Cyber Security
Oct 04, 2019
Who Clicked? The Story of Mary Mike and John are hackers that are very successful at their job.  Mary is CFO at her midsize company and responsible for about 10 million dollars. She’s in such a hurry to get to her daughters’ game she won’t think twice...
Category: Cyber Security
Oct 03, 2019
Who Clicked? The Story of Emily Look at the cute little boy
There was a woman, let’s call her Emily...
Category: Cyber Security
Oct 02, 2019
Who Clicked? The Story of Jim Had I known then…
Jim liked to watch the news online and surf the web during breaks.  Nothing that was inappropriate, just normal websites, Facebook, news, weather, etc.
Next thing you know his computer was showing some weird things on the screen. Uh oh, he thought, I better let Fred know so he can call our IT company to fix it...
Category: Cyber Security
Jun 27, 2019
I Love Technology New technology has always intrigued me, but this time, it also scares me.
Category: Cyber Security
Jun 14, 2019
Do You Really Need A Penetration Test? You might’ve heard that this is the best way to detect any vulnerabilities that you may have, but actually that’s not the case. Let’s dive into some of the downsides of doing a pen test.
Category: Cyber Security
Apr 17, 2019
Risky Business: Defining 3rd Party Vendor Risk It’s affordable, it’s convenient, it’s effective — here’s the catch.
Category: Cyber Security
Apr 16, 2019
Petya: Latest Global Ransomware Attack Petya: There is a vaccine, but no kill switch.
Category: Cyber Security
Apr 09, 2019
Top Technology Trends Find out what technology movements are making waves in your industry.
Category: Cyber Security
Oct 03, 2018
Staying Safe... Know the difference between Cyber-Security and the Safe Operation of your computer…… 5 empowering ways to help keep you safe from Cyber Attacks

How do we stay safe from Cyber Attacks in this day and age?  They seem like they are everywhere and no one is sure how to avoid being a target.  Here at EZ Micro we have put together a list of 5 ways that will help keep you safe from the hackers.
 
Category: Cyber Security