Blog

Beware of these 4 types of hackers

Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four different […]

Tips to protect your brand online

Your brand’s online reputation is not helpless from negative reviews on consumer complaint sites. Though it’s nearly impossible to remove them from the Internet, there are online reputation management strategies you can use to deal with these pesky complaints. Don’t engage site or users directly Don’t send emails demanding to have the content removed or […]

Forget these disaster recovery myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has dramatically changed the DR landscape. Unfortunately, there are still many misconceptions about DR. Here are a few of the myths that no […]

4 Social engineering scams to watch out for

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, hackers are preying on gullible victims to circumvent network security systems and steal sensitive information. If you don’t want to be the next victim, read […]

Leave Your Privacy At The Door

Yet another reminder that free apps aren't really free.

 

A handful of popular iPhone apps were discovered to have embedded code that collected your location data, and in some cases, data related to your WiFi network and device for the purpose of selling it to marketing companies.

Security in the Internet of Things

Smart TVs, dishwashers, laundry machines, toasters, coffee makers and homes. Today, we are closer to the "future" that previous generations dreamed of than ever before, the culmination of this innovation being the "Internet of Things". The IoT is a massive network of devices that are connected to the internet, ranging anywhere from printers, wearable devices such as FitBits, security cameras, and more.

Equifax: One Year Later

The past year has been something of a disaster for the modern consumer. Starting with the MONUMENTAL Equifax breach that started in March of 2017 and was not disclosed until 6 months after the fact, to the more recent-yet-equally-terrifying Cambridge Analytica scandal.

Learning Hacks – Bill Gates

When you think of the origins of Silicon Valley and the computer technology industry's explosion, you think of the same 3 companies: Google, Microsoft, Apple. Similarly, the founders of those three companies have ascended to a sort of legendary status in the mind of the public.

Valuable strategies for SMBs on Facebook

Facebook’s most recent monthly active users numbered over 2.3 billion. That’s almost one account for every three people on the planet! Many of your ideal customers use this platform to interact with businesses and creating a page for them to engage with yours costs almost nothing. Here are six free ways to get more eyes […]

5 Simple but effective cybersecurity tricks

Can you name five cybersecurity best practices? Most people can’t, and few of those who can, actually follow them. Unfortunately, cyberattacks are far too common to be lax about staying safe online. Your identity could be stolen, or even worse, you could expose private information belonging to your company’s clients. There are many ways you […]