https://macguyvertech.com/wp-content/uploads/2022/01/pexels-tima-miroshnichenko-5380649-1280x640.jpg

Cybersecurity is no longer as easy as occasionally running a virus-detection program. Hackers are now a highly-organized, intelligent threat to big and small businesses, continuously scanning networks, software updates and remote workplaces for potential vulnerabilities. Steve McKeon (Mac), of MacguyverTech sat down to discuss the “Cyber Criminal and Hacker Pandemic” on the “Best Kept Secret with Jay Kingley” podcast on Centricity earlier this month. Business owners do a top-to-bottom scrub of their security systems, check...

https://macguyvertech.com/wp-content/uploads/2021/11/Steven-McKeon-Mac-1000x640.jpg

On “Executive Leaders Radio,” MacguyverTech CEO Steve McKeon (Mac) joined three other prominent business leaders on the Radio America broadcast to talk about his personal and business history. From early indicators to overseas adventures to his current ventures in blockchain, cyber security and software development, Steve discussed how he got to where he is today with Herb Cohen. On Life: Mac is a protector; the oldest of four brothers. Due to personal tragedy, he acted...

https://macguyvertech.com/wp-content/uploads/2021/01/Depositphotos_5446120_l-2015-1280x640.jpg

While Blockchain technology has unveiled a new horizon for innovation and money management, it has also provided new strategies for criminal hackers across the globe. Backed by this novel technology, criminal companies have made themselves nearly untouchable, allowing them to wreak havoc on databases and infrastructures worldwide in the midst of an all-out cyberwar. In a recent interview with CryptoWendy, MacguyverTech Founder and CEO, Steve McKeon, spoke about his own experiences with criminal hackers, as...

https://macguyvertech.com/wp-content/uploads/2021/06/Security-Blog--scaled-e1623255318650-1280x640.jpg

Cybersecurity has been a topic that has been pushed to the back of a lot of executive’s minds. Often times the only time you would care about cybersecurity is only after becoming a victim. While this approach may have worked in the past, the last 6 weeks have proven that it is time to take an active role in your companies cyber resiliency. Hackers are becoming bolder with each attack and as a result the...

https://macguyvertech.com/wp-content/uploads/2021/01/Depositphotos_144711645_l-2015-1280x640.jpg

If you paid any attention to the national news in recent weeks, you would have seen the coverage of the Colonial Pipeline attack. A quick refresher, a devastating ransomware attack that brought operations of a major gas pipeline to a halt. Ransomware is usually installed thru the method many have heard of phishing. Phishing is a very common cyber-attack but there are three different types of phishing attacks. There is spear phishing where attackers target...