Blog

The Most Overlooked Security Threat

Cloud technology icon with a lock icon in the middle of the cloud

By Jennifer Adams

When thinking of ways hackers can infiltrate your system, what first comes to mind? Phishing emails and suspicious looking pop-ups are commonly known ways to infect your devices with malware. A frequently overlooked cybersecurity vulnerability is your removeable media. CD’s, DVD’s, flash drives… Just think, how important is the information stored there? These are the risks associated with removeable media and how to manage them.

They’re Not All Harmless – How Computer Worms Work

Green worm with pink dots and big eyes on a computers motherboard

By Jennifer Adams

When worms are mentioned, most people typically think of bait used for fishing or gummy worms. While these worms are harmless, computer worms aren’t. Once they are in your computer, they quickly infiltrate your files and spread by sending compromised emails containing identical worms to each of your contacts. This is how computer worms work and how they compromise your security.

What are Computer Worms? 

Understanding threats – The difference Between Malware and Viruses

Side view of a pc monitor, a string of words leak, virus, spyware, Trojan highlighting in red font among a chaotic set of green computer symbols.

By Jennifer Adams

“Malware” and “virus” are catch-all terms used to refer to cybersecurity threats that are often used interchangeably, but what is the difference? What impact do they have on your network? Understanding the difference between a virus and malware is helpful if you encounter a situation that you must address.  Keep reading to find out more.

Malware:

If it’s too good to be true, it is. How to spot Trojan Horses

Black and white painting by Motte of a trojan horse next to the walls of Troy

By: Jennifer Adams

Just like the Greeks were able to gain access and take the city of Troy by hiding soldiers in a giant wooden horse gifted to them so they could gain access and attack, hackers use trojan horses to trick you into inviting them into your network. Here are a few different kinds of trojans, how to spot them so they do not infect your network, and what to do if you believe one is on your computer.

What is a Trojan Horse?

What is your ROI on Cybersecurity?

A man sitting at a table with a device that projects a virtual screen that has the letters ROI and a graph. ROI, Return on investment business and technology concept.

By Jennifer Adams 

According to Tech Republic, “Figuring a cybersecurity budget is a combination of emotion and guesswork.”  With security spending on the rise, IT professionals have the latest technology and security tools at their fingertips to protect their organizations most valuable data.  But how much security do you need? How do you know you are investing in the right products?  What is ROI on cybersecurity? The answers to these questions depend on several factors.

What is Xerox® Docushare®?

 Xerox website homepage. Xerox logo visible on display screen being magnified by magnifying glass

By Jennifer Adams

Image courtesy of Xerox

One of the drawbacks of a work-from-home or hybrid work environment is the inaccessibility of company files. To be productive, workers need to be able to share and access files easily. Xerox® Docushare® provides a secure environment created to encourage collaboration and help workers so they can spend less time doing tedious paperwork and more time doing what they do best.

Subscribe To Updates

Get notified of important Xerox news and helpful articles from XETX.