[vc_row][vc_column][vc_column_text]We talk a lot about malware and protecting your computers and servers from intrusion. But, your Point-of-Sale systems are another window of weakness where cyber attacks can occur. We all remember the Target attack. More recently,...
Data Security
Digital Ghosts Can Be a Nightmare For Data Security
[vc_row][vc_column][vc_column_text]As Halloween nears, we thought a ghost story would be a good idea. But, this isn't about Casper or ghosts in the traditional sense at all. This is a new kind of haunting, one that can linger long after death if not exorcised...
Be Cyber Safe: October Is National Cyber Security Month
[vc_row][vc_column][vc_column_text]Since 2004, October has been observed as National Cyber Security Awareness Month (NCSAM) and was created in a collaborative manner between the U.S. government and industry in the hopes of increasing awareness regarding cyber security...
US Gov’t Issues Malware Warning Tied to Hurricane Matthew
[vc_row][vc_column][vc_column_text] Weather isn't the only threat to fear in a hurricane. Cyber criminals are using the chaos and destruction following Hurricane Matthew to take advantage of unsuspecting web users using malware and phishing scams. The US Computer...
Google Amps Up Internet Security For Everyone
[vc_row][vc_column][vc_column_text] There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing....
EMV Everywhere: All About the Chip Card Revolution
[vc_row][vc_column][vc_column_text]All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It's an older but highly secure technology that is almost impossible to hack. The move to this type of...
3 Ways Dear Aunt Sally is a Potential Data Security Victim
[vc_row][vc_column][vc_column_text]Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks,...
5 Must-Have Features of Antivirus Software
[vc_row][vc_column][vc_column_text] Since consumers and businesses first started connecting their computers to the internet decades ago, antivirus software has been one of the most important segments of the tech industry. It’s become so ubiquitous in fact, that many...
Data Security Warning: The True Cost Of Free WiFi
When you’re out and about and running up against your cellular data limit, there’s nothing quite as inviting as a sign indicating that free WiFi is available. In the age of ubiquitous broadband internet everyone is expected to be constantly connected for both personal...
2 Fundamentals of Small Business Disaster Recovery
Small businesses need to prepare for disaster as much as big ones. It may be even more crucial because the statistics on small business survival after a disaster are daunting. Only 35% of small businesses have a Disaster Recovery Plan (DRP). 90% of small businesses...