Blog

Welcome to the World of Outsourcing

As we draw ever nearer to the 2019 Tax Season, you likely are already considering what you'll need to do for your tax returns. Many taxpayers decide to "outsource" their returns to a local tax firm, under the pretense that they are more qualified and better equipped to navigate the nuances of the U.S. tax system.

Beware of these 4 types of hackers

Beware of these 4 types of hackers

Hackers come in all shapes and sizes. From kids wanting to gain notoriety on the internet to political groups trying to send a message, the motives for a cyberattack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four different […]

Tips to protect your brand online

Tips to protect your brand online

Your brand’s online reputation is not helpless from negative reviews on consumer complaint sites. Though it’s nearly impossible to remove them from the Internet, there are online reputation management strategies you can use to deal with these pesky complaints. Don’t engage site or users directly Don’t send emails demanding to have the content removed or […]

Forget these disaster recovery myths

Forget these disaster recovery myths

Disaster recovery (DR) isn’t what it used to be. Long gone are the days when a DR solution cost over a hundred thousand dollars and relied predominantly on tape backups. Cloud computing has dramatically changed the DR landscape. Unfortunately, there are still many misconceptions about DR. Here are a few of the myths that no […]

4 Social engineering scams to watch out for

4 Social engineering scams to watch out for

Experts are constantly creating new security systems to protect individuals and businesses from hackers. From those who want to attend popular events like the Olympics to avoiding an angry boss, hackers are preying on gullible victims to circumvent network security systems and steal sensitive information. If you don’t want to be the next victim, read […]

Leave Your Privacy At The Door

Yet another reminder that free apps aren't really free.

 

A handful of popular iPhone apps were discovered to have embedded code that collected your location data, and in some cases, data related to your WiFi network and device for the purpose of selling it to marketing companies.

Security in the Internet of Things

Smart TVs, dishwashers, laundry machines, toasters, coffee makers and homes. Today, we are closer to the "future" that previous generations dreamed of than ever before, the culmination of this innovation being the "Internet of Things". The IoT is a massive network of devices that are connected to the internet, ranging anywhere from printers, wearable devices such as FitBits, security cameras, and more.

Equifax: One Year Later

The past year has been something of a disaster for the modern consumer. Starting with the MONUMENTAL Equifax breach that started in March of 2017 and was not disclosed until 6 months after the fact, to the more recent-yet-equally-terrifying Cambridge Analytica scandal.