Blog

How Amazon Monitors Your Shopping Habits

Amazon has proven itself to be an ever-present, ever morphing entity, capable of running the largest E-Commerce operation in history while simultaneously competing in various industries such as entertainment, consumer manufacturing, food delivery, and, more recently, healthcare.

The Real Danger of Robocalls: SSN Scams

A few months ago, we talked about the Robocall-pocalypse and the disruptive effect it was having on individuals all over the country. While most of us can identify a robocall and opt to hang up nearly immediately, they pose a very real threat to personal privacy and security to those who get hooked by the frightening content of their messages.

A Six Figure Cyber Attack

Everywhere you look, IT companies are harping on about cyber security. So much so, in fact, that it's easy to become desensitized to the very real threat of phishing, malware, and email account compromise. Sometimes, however, a story comes by that hits just a little bit too close to home, and might serve as a reminder of just how dangerous these threats are; not only to businesses, but to individuals.

Here’s how you can manage Google reviews

More consumers are now turning to online reviews to help in their buying decision process. With Google reviews, you can enhance your online presence by making sure your business ranks well in search engine results pages (SERPs). Here’s what you need to know to make that happen.   How Google changed search results Google now […]

Will you put UPS in your network equipment?

When a power outage occurs, smart business owners use an emergency power system to keep workstations from suddenly shutting down. This prevents data loss and keeps computers operational. Connecting your networking equipment to an uninterruptible power supply (UPS) system will also keep your employees productive during a power outage. UPS for network equipment UPS systems […]

Benefits of using a VPN

While using a virtual private network or VPN isn’t a silver bullet to online privacy threats, it still offers crucial security benefits, especially if any part of your day involves using unsecured channels such as public Wi-Fi. Given its importance, how do you pick the right one and what factors do you need to consider? […]

Mobile Phishing: Same Old Trick, New Apperance

It seems that even our mobile phones are vulnerable to attacks from scammers and cybercriminals. While just about everybody is familiar with Robocalls, IT Support scammers and other phone-based trickery, a recent study by security vendor Wandera has revealed that iOS users are twice as likely to experience a phishing attack than an Android user.

A Deeper Look At Location Data

Each generation has something that they can claim as "theirs". The 80's had pastel colors, the 90s had baggy jeans and flannels, and today's generation has… the smartphone. And apps. It's not quite the same thing, seeing as smartphones are reaching unparalleled ubiquity in people's lives, regardless of age, and for good reason.