Mysterious ‘Metador’ Targets YOUR Internet Provider

Mysterious ‘Metador’ Targets ISPs A previously unknown threat actor named ‘Metador’ has been breaching telecommunication companies, internet services providers (ISPs), and universities across multiple countries in the Middle East and Africa for about two years. Metador is primarily focused on the development of cross-platform malware for espionage purposes. The group uses two Windows-based malware named […]

Enable your business to thrive in a disruptive world

Digital Trust is a make or break for your business In today’s digital world where most business is done online and data breaches are becoming more common, digital trust has become a valuable commodity for those companies that earn it. This phenomenon – where trust has become the currency of which businesses differentiate themselves from […]

Acronis – Proactive protection for your business

Why managed services? Managing and keeping internal IT operations running smoothly can be time consuming and complicated. With internal IT operations stretched thin, vulnerabilities often go undetected, patches are missed, and your business-critical data could be at risk. By using Live-Tech – 889,703 as your trusted IT service provider, we will focus on proactively protecting your business […]

What Is the Hidden Cost of Security?

What Is the Hidden Cost of Security? Until 2020, experts forecast the industry will be struggling to secure over 20 billion devices from attacks, and it only is getting worse from here. Cybercrime will never cease to be a money-making machine, with hackers already making trillions of dollars from stealing sensitive data, medical records, financial […]

CVE-2021-44228 Log4j – Get the protection you deserve

Microsoft’s unified threat intelligence team, comprising the Microsoft Threat Intelligence Center (MSTIC), Microsoft 365 Defender Threat Intelligence Team, RiskIQ, and the Microsoft Detection and Response Team (DART), among others, have been tracking threats taking advantage of CVE-2021-44228, a remote code execution (RCE) vulnerability in Apache Log4j 2 referred to as “Log4Shell”. The vulnerability allows unauthenticated […]

Top 10 Reasons You Need SSL

Top 10 Reasons You Need SSL Meet the New Industry Requirements Browsers now display “Not Secure” warnings on all unencrypted connections. The CA Security Council reports only 2% would proceed past untrusted connection warnings and only 3% would give credit card information without the padlock icon. According to an Ipsos Group 2018 study, 87% of […]

Is your business prepared for an ATTACK? Hunt or Be Hunted | Huntress

Is your business prepared for an ATTACK!? Hunt or Be Hunted! Live-Tech & Managed Service Providers layer preventative security products to defend their customers. For years, this adequately protected SMBs against most unsophisticated threats. Unfortunately, the threat landscape dramatically shifted in 2016 when hackers realized small businesses could be as lucrative as well-guarded enterprises. As […]