Blog

Leave Your Privacy At The Door

Yet another reminder that free apps aren't really free.

 

A handful of popular iPhone apps were discovered to have embedded code that collected your location data, and in some cases, data related to your WiFi network and device for the purpose of selling it to marketing companies.

Security in the Internet of Things

Smart TVs, dishwashers, laundry machines, toasters, coffee makers and homes. Today, we are closer to the "future" that previous generations dreamed of than ever before, the culmination of this innovation being the "Internet of Things". The IoT is a massive network of devices that are connected to the internet, ranging anywhere from printers, wearable devices such as FitBits, security cameras, and more.

Equifax: One Year Later

The past year has been something of a disaster for the modern consumer. Starting with the MONUMENTAL Equifax breach that started in March of 2017 and was not disclosed until 6 months after the fact, to the more recent-yet-equally-terrifying Cambridge Analytica scandal.

Learning Hacks – Bill Gates

Learning Hacks – Bill Gates

When you think of the origins of Silicon Valley and the computer technology industry's explosion, you think of the same 3 companies: Google, Microsoft, Apple. Similarly, the founders of those three companies have ascended to a sort of legendary status in the mind of the public.

Valuable strategies for SMBs on Facebook

Valuable strategies for SMBs on Facebook

Facebook’s most recent monthly active users numbered over 2.3 billion. That’s almost one account for every three people on the planet! Many of your ideal customers use this platform to interact with businesses and creating a page for them to engage with yours costs almost nothing.

5 Simple but effective cybersecurity tricks

5 Simple but effective cybersecurity tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common to be lax about staying safe online. Your identity could be stolen, or even worse, you could expose private information belonging to your company’s clients.

Cash in on tech trends with these 5 tips

Cash in on tech trends with these 5 tips

What recent tech fads has your SMB dismissed as silly? 3D printing, internet of things…Pokémon GO? Juvenile as they may seem, these trends helped a lot of businesses make money. Navigating them may seem like a lost cause, but with the right know-how, you can earn profits by exploiting current tech trends.

Why Should I Care About My Data?

Why Should I Care About My Data?

From the monolithic and devastating Equifax breach, to the Cambridge Analytica scandal that happened only a few months ago, few of us truly realize that “free” platforms aren’t free. Rather, they allow you to use their services at the cost of unregulated, unchecked, undisclosed collection of your PII (personally identifiable information). They then sell your data to large firms who will use it to market products or services to you that they think you are likely to purchase.

4 BYOD security risks you should prepare for

4 BYOD security risks you should prepare for

Personal computing is with us wherever we go. Thanks to the rise of the mobile industry, smartphones and tablets allow us to take work home with us. And with the bring your own device (BYOD) strategy, businesses have never been so productive. However, BYOD can pose a number of security risks if you’re not careful.

Secrets of Success — As told by Jeff Bezos

Jeff Bezos founded Amazon on July 5th, 1994 as an online book retailer. Today, Amazon has a market presence in retail, cloud services, entertainment, pharmaceuticals, all while pulling in nearly $200 billion in revenue annually. Never in modern history have we seen a company expand as rapidly and effectively as Amazon.

Framework-logo
 
©2018 FrameWork IT Services