B4 Networks Inc.
  • Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • YouTube
  • RSS

Blog

Deleting Your Google Search History Will Soon Be Easier

Google is rolling out some important changes that will make it easier for people who use their services to control their data. They're starting with their most widely used service, which is ...

New Fake Antivirus Tech Support Scam Tricking Users

McAfee has long been a popular target of scammers, but recently, they've changed the nature of their game. In years past, they'd display a webpage informing you that any McAfee products on ...

B4 Networks Proud to Be Featured on Global List of Leading Managed Service Providers!

B4 Networks is thrilled to announce that they have been named to Penton Technology’s 2017 MSPmentor 501 Global Edition at a global ranking of 478! The MSPmentor 501 Global Edition is a distinguished list and reports identifying the world’s top 501 IT Managed ...

Hackers Can Use PDF Files To Access Windows Credentials

Security researcher Assaf Baharav from Check Point Security has discovered a new twist on an old, fairly well-known attack.  He was able to essentially "weaponize" PDFs to steal Windows credentials stored ...

New Malware Takes Screenshots and Steals Your Passwords

Recently, a new strain of malware called "SquirtDanger" has been found by researchers at Palo Alto Networks Unit 42, and it's a particularly nasty one for a couple of reasons.  First ...

Does Your Business Have A Cybersecurity Incident Response Plan?

If your company has an incident response plan that you can rely on in the face of a cyber attack, then you're ahead of most of the world, according to research ...

Finding The Right Computer Support Company For Your Business

Do You Know How Most IT Support Companies Make Their Money? Most Niagara IT support providers only provide services to their clientele under the break-fix business model.  It’s a model that at in its ...

What is Social Engineering And How To Avoid It?

What is a social engineering? Social engineering is where an attacker uses human interaction (i.e. social skills) to acquire or compromise information about an organization or its computer systems. An attacker may ...

Luck Is For Leprechauns

Luck Is For Leprechauns — Is Your Business Prepared for Future Security Threats? This might sound harsh, but it’s the truth.   Just Because You’ve Been ...

Protect Yourself From Credit Card Fraud

The past couple of years have been a rough ride for anyone ...

Contact

B4 Networks Inc.B4 Networks Inc. Logo $$$

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • Google Plus
  • YouTube
  • RSS