A Detailed Look At The Robocall Epidemic

We've talked about robocalls on this newsletter before, but there information available on the nitty-gritty of the problem was definitely limited. Now, a report from call security company Hiya allows us to see the extent of the robocall pandemic that has swept the world over the last 6 months.

Disaster recovery audit fail: A few lessons

In talking about disaster recovery plans (DPR), it’s best to illustrate with real-world scenarios to help you understand things better. They offer concrete examples of successes and failures, and you can learn a lot from them. Here’s an example of a DPR audit and the lessons it offers. Hosting certain types of data and managing […]

USB Peripherals – A Blessing Or A Curse?

The past few years have brought forward a bevy of technologies developed in the name of convenience. Internet of Things devices like the Google Home, Amazon's Alexa, or remotely accessible home security devices like Nest cameras and doorbells among them, not to mention the thousands of various doodads, gizmos, and genuinely useful tools that are USB compatible.

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints. Ultimately, your business could […]

Making the most of digital marketing

Many business owners believe they should be promoting their organization in as many places as possible. Realistically, however, updating social media statuses without proper planning and strategy could do more harm than good. Read on to understand how timing is everything in social media marketing. Social media has helped businesses not only to cut down […]