hacker

Law Firms at High Risk of Cyber Attack

The American Bar Association (ABA) has put law firms on notice that they are prime targets for hackers. Harvey Rishikof, co-chair of the American Bar Association’s Cybersecurity Legal Task Force, described law firms as a “treasure trove” of attractive information.Law firms handle a variety of high-value information including intellectual property such as patents and trade…

Learn More

Why Hackers Target SMBs

If you think your business is too small to be targeted by hackers, you are in for an unpleasant reality. Automated exploits of common vulnerabilities can equally target victims of large enterprises as well as SMBs. And any sized company connected to the Internet is vulnerable. In fact, smaller companies are often targeted precisely because…

Learn More

Network Intrusion: How it happens and how to prevent it

A properly designed and deployed network intrusion detection system will help keep out unwanted traffic. However, it does help for defenders to have a general understanding of the types of attacks hackers use to steal data and absorb network resources so businesses can be sure they are properly protected. Worms Worms, which are a type…

Learn More

JP Morgan: Hackers stole contact data for 76 million households

More details are emerging about the cyber security breach at JP Morgan. According to the Wall Street Journal about 76 million households, an amount equivalent to two-thirds of American households, were affected by a cybersecurity attack on the bank this summer in one of the most sweeping disclosed breaches of a financial institution. Seven million small business were also affected.…

Learn More

Home Depot Latest Victim of Cyber Attack

Home Depot is the latest company to fall victim to a high-profile cyber attack. According to Bloomberg Businessweek, a massive batch of credit and debit card information that went on sale on a criminal Internet site Tuesday may be from Home Depot stores and could be linked to hackers responsible for breaches at Target and…

Learn More

Protecting Against Zero Day Vulnerabilities

What is a zero-day vulnerability? A zero-day vulnerability exploits an unknown flaw in software and applications — a flaw that developers have not yet had a chance to fix or patch.  Zero-day attacks occur during the vulnerability window that exists in the time between when vulnerability is first exploited and when software developers release a…

Learn More

Putting Cyber Security Threat Numbers to Work for your Business

Cyber security companies like to throw around numbers: such as these stats from IBM and Verizon: 66% of the breaches took months or more to discover Approximately 70% of the breaches were discovered by external parties 37% of breaches occurring between 2012 and 2013 affected financial organizations 92% of organizational breaches were perpetrated by outsiders…

Learn More

US Government Warns Against Using Microsoft Internet Explorer Until Security Flaw is Fixed

A recently discovered bug in Microsoft’s Internet Explorer browser leaves all versions of the popular browser open to potential attacks, according to a security  advisory released by Microsoft on April 26, 2014. This security exploit is an unpatched flaw in the Internet Explorer browser that allows attackers to run malicious code remotely. Anyone in control of…

Learn More

Get More Information

Use the form below to get more information about ACE IT Services and what we can do for you.

  • This field is for validation purposes and should be left unchanged.

Contact ACE IT Solutions for more details on our data storage, backup and disaster recovery solutions.

Call (646) 558-5575
Or Request More Information

  • This field is for validation purposes and should be left unchanged.