Hackers could be in your network right now? Would you even know?
Earlier this year, our security team had to help a small, two-person law firm. They thought they were too small to be hacked. Not only did the hackers get into […]
Earlier this year, our security team had to help a small, two-person law firm. They thought they were too small to be hacked. Not only did the hackers get into […]
There are thousands of hackers who get up every morning with one goal in mind: to find a new vulnerability in a commonly installed software (like Adobe, Microsoft Office, Chrome, […]
You! And your employees. Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken […]
Like it or not, device manufacturers love to fill your brand-new PC, tablet or phone full of “free” applications like games, music and photo apps and more (manufacturers actually get […]
This week, here are 10 easy tips to mobile phone security: Lock your device with a PIN or password and never leave it unattended in public. Uninstall apps you don’t […]
Your smartphone might be the most important piece of technology you own. Your life is in there: online banking, getting directions, making payments, private texts, personal photos and calls. That’s […]
If you’re using a personal Box, Dropbox, OneDrive, Google Drive or other consumer-grade file sync and sharing cloud applications, listen up! These applications pose a huge threat to your company […]
With people working from who knows where and so many access points from cell phones to laptops and home computers, how can anyone hope to keep their network safe from […]
We’re all guilty of it: connecting to free public WiFi. Whether it’s at the coffee shop, hotel or airport, the temptation to check e-mail and surf the web is just […]
Never forget that e-mail constitutes a legal record and can be admissible in legal actions, not only in the courtroom, but in the court of public opinion. People sue for […]