by Bob Martin | Dec 21, 2017 | BYOD, Cyber Security, Data Security, IT security, Network Security
Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”. While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s data. GROWING IN POPULARITY BYOD had...
by Bob Martin | Dec 12, 2017 | Cyber Security, Data Backup, Data Protection, Data Recovery, Data Security, IT security, Network Security
Whether you’re traveling for business or pleasure, it’s likely you’re logging in for work while on the move. Whether it’s on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays. Hackers know...
by Bob Martin | Oct 5, 2017 | Cyber Security, Data Backup, Data Security, ransomware
Ransomware is a hot topic these days. We’re seeing it in the headlines far more than we’d like. The trick about digital attacks like this, and most malware attacks in general, is the ever-changing nature of them. The ransomware attacks we saw a year ago...
by Bob Martin | Oct 3, 2017 | Cyber Security, Data Backup, Data Security
Hooray! October is here and that means it’s National Cyber Security Awareness Month. You may not be as excited as us, but you should still do your part and be aware of how you interact online. The more interconnected we become online, the more windows of...
by Bob Martin | Sep 28, 2017 | Cyber Security, Data Security, IT security, Malware, Network Security, ransomware
A new hack has been announced and it’s affecting over 2 million users. The infected application is called CCleaner and it’s one that even we have mentioned in the past because it’s free and works well to run file clean up to remove clutter from your...
by Bob Martin | Sep 14, 2017 | Cyber Security, Data Security, Network Security
The Equifax breach is a big one. The company holds the credit reports of over 143 million US consumers, and those reports have all our most valuable information. They are suggesting that you should not wait to determine if your information was breached to take action...