CTTS, Inc.

Blog

Government Warns Increase In Cyber Attacks Targeting Hospitals

Is your business in any way affiliated with or connected to the healthcare industry? If so, be advised that recently, the FBI and the US Cybersecurity and Infrastructure Security Agency (CISA) have ...

12 Cyber Readiness Strategies To Move From Defense To Offense

“Everyone has a plan until they get punched in the mouth.” –Mike Tyson As business leaders, we’ve all been punched in the ...

Amazon Employee Responsible For User Data Breach

Recently, one or more Amazon employees disclosed customer email addresses to an unknown third party, prompting Amazon to send a notification email out to impacted customers which reads as follows: "We are ...

Some Popular Android Apps Found To Include Malware

Google does an admirable job of keeping its sprawling Play Store free of apps containing malware. Their verification system is world-class. That said, no system is perfect, and that includes Google's. In ...

This New Ransomware Can Infect A Network In Just Minutes

Not all ransomware strains are created equally. Some are designed as slow burns that will infect a target system, expanding its reach for days, or even weeks before striking and locking your ...

4 Questions Your IT Services Company Should Say “Yes” To

Out with the old and in with the new! For far too long, small businesses have taken an old-school ...

Photoshop Testing Security For Images To Prevent Theft And Fakes

Deep Fakes are becoming an increasingly large problem. If you're not familiar with the term, a Deep Fake is an advanced photo or video technique in which an existing person in a ...

Mac And Android Added To GravityRAT Malware’s Targets

Malware comes in all shapes and sizes. Some strains copy and encrypt files. Others serve annoying ads. Still others work quietly in the background, mining this or that cryptocurrency using your computer's ...

WordPress Loginizer Plugin Was Automatically Updated Due To Vulnerability

WordPress tends to take a light-handed approach when it comes to managing the legions of plugins that are compatible with the most popular blogging platform on the planet. This time, however, they're ...

Coordinated Effort Underway To Take Down Trickbot Malware

Score one for the good guys. A team led by Microsoft's DCU (Digital Crimes Unit) that includes Symantec, NTT Ltd, ESET, and Lumen's Black Lotus Labs is working on something new. They ...

Contact

CTTS, Inc.
  • 557 S. Interstate 35
    Suite 201
    Georgetown, TX 78626
  • Phone: (512) 388-5559
  • Phone: (512) 388-5559

Technology Tips

Protect your business from the latest threats with our weekly Tech Tip Tuesday articles, written by our own Team of experts!

Sign Me Up!