Imagine IT (i)nsights

Imagine IT Insights

Don’t be a VoIP eavesdropping victim

October 31st, 2018 Imagine IT 2018october31voip_a, attacks, cybercrime, eavesdropping, prevention, smb, sme, threat, voip 2018october31voip_a, attacks, cybercrime, eavesdropping, prevention, smb, sme, threat, voip

In the digital world, eavesdropping is a form of cyberattack where voice over internet protocol (VoIP) phone calls are intercepted and recorded, usually to glean personal or business information. Since it does not affect call quality, it’s hard to tell if you’ve been a victim of eavesdropping. Ensure that you never become one by implementing these...

Google ridding MR from search results

July 3rd, 2017 Imagine IT policy, search, security, 2017july3healthcare_a, cybercrime, google, Healthcare, medical, privacy, protection, records, results policy, search, security, 2017july3healthcare_a, cybercrime, google, Healthcare, medical, privacy, protection, records, results

Five tips to prevent VoIP eavesdropping

April 27th, 2017 Imagine IT 2017april27voip_a, attacks, cybercrime, eavesdropping, prevention, smb, sme, threat, voip 2017april27voip_a, attacks, cybercrime, eavesdropping, prevention, smb, sme, threat, voip

Vulnerabilities on WordPress websites

February 27th, 2017 Imagine IT cloud, patch management software, patches, security, 2017february27_webandcloud_a, cybercrime, web, Web & Cloud, wordpress cloud, patch management software, patches, security, 2017february27_webandcloud_a, cybercrime, web, Web & Cloud, wordpress

Predicting cyber-threats in 2017

December 13th, 2016 Imagine IT 2016december13_security_a, network security, Security, security, cyber-attacks 2017, cyber threats, cybercrime, protection 2016december13_security_a, network security, Security, security, cyber-attacks 2017, cyber threats, cybercrime, protection

The curse of Chimera ransomware

December 29th, 2015 Imagine IT chimera, Security, security, 2015dec14_security_a, cybercrime, data loss, malicious software, malware, qs_3, ransomware chimera, Security, security, 2015dec14_security_a, cybercrime, data loss, malicious software, malware, qs_3, ransomware

Twitter warns about cyber attacks

December 18th, 2015 Imagine IT Security, security, 2015dec18_security_a, cybercrime, cybersecurity, qs_3, Social Media, twitter Security, security, 2015dec18_security_a, cybercrime, cybersecurity, qs_3, Social Media, twitter