[vc_row][vc_column][vc_column_text]Today, shadows are very front of mind. Unfortunately, Punxsutawney Phil saw his, meaning six more weeks of winter. But there's another shadow that we'll be seeing a lot more of in 2017... Shadow IT. Shadow IT refers to IT systems and...
Cyber Security
Is Your Data Security Budget a Waste of Money?
[vc_row][vc_column][vc_column_text]When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have...
Data Security Tip: January 28th is National Data Privacy Day
[vc_row][vc_column][vc_column_text] In a very interconnected world, it's imperative that we remember to safeguard our data security. The National Cyber Security Alliance (NCSA), the organization that heads Cyber Security Awareness month each October, has been leading...
Ransomware: To Pay or Not To Pay?
[vc_row][vc_column][vc_column_text] We've talked a lot about ransomware in the last year. Frankly, the whole world has been talking about it as it becomes one of the leading global cybersecurity threats. The biggest problem with this type of malware is the urgency it...
Digital Forensics Is the New Cybersecurity CSI
[vc_row][vc_column][vc_column_text]You've certainly heard the term 'cybersecurity' plenty in the last year. Between the high profile cyber attacks on big box retailers to the newsworthy ransomware attacks on hospitals, if you haven't heard it, you must be...
Cybersecurity Tip: Voice-Activated Smart Hubs Are Listening
[vc_row][vc_column][vc_column_text] Did you get an Amazon Echo or Google Home for Christmas? They may be really nifty gadgets that make hands-free operation fun, but they're listening to more than just your music requests. These devices have become increasingly...
Malware Alert: Mobile Banking Trojan on Android Phones
[vc_row][vc_column][vc_column_text] Every day new cybersecurity threats are being found. Most recently, there's been an uptick in malware related to mobile banking. The trojan program clones your mobile banking login page and collects your login information when you...
Online Shoppers Beware of Malware in Fake Delivery Notifications
[vc_row][vc_column][vc_column_text] Online shopping is a great gift to those who prefer to skip the lines and the parking hunt, or even the need to leave home. We can get all of our holiday gifts from our smartphones. While it's great for shoppers, it's great for...
Malware Tip: Protecting Yourself from Phishing Hacks
[vc_row][vc_column][vc_column_text] Phishing is one of the most prevalent cyber attacks currently. Phishing scams are generally fake email messages appearing to come from legitimate companies, like utility companies, a bank, or the IRS. They direct you to a fake...
5 Ransomware Stats That Will Scare You
[vc_row][vc_column][vc_column_text]We've talked about ransomware a lot in 2016. It's a growing, ever-evolving threat to your data security that you may not be paying enough attention to. Preventing this form of cybercrime takes a combination of robust security,...