[vc_row][vc_column][vc_column_text]Hooray! October is here and that means it's National Cyber Security Awareness Month. You may not be as excited as us, but you should still do your part and be aware of how you interact online. The more interconnected we become...
Data Security
Hackers Build Backdoor into CCleaner App
[vc_row][vc_column][vc_column_text]A new hack has been announced and it's affecting over 2 million users. The infected application is called CCleaner and it's one that even we have mentioned in the past because it's free and works well to run file clean up to remove...
What to Do in the Wake of the Equifax Security Breach
[vc_row][vc_column][vc_column_text]The Equifax breach is a big one. The company holds the credit reports of over 143 million US consumers, and those reports have all our most valuable information. They are suggesting that you should not wait to determine if your...
Data Security Warning: Hurricanes Bring Out the Scammers
[vc_row][vc_column][vc_column_text] In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to...
Forget Everything You Know about “Strong” Passwords
[vc_row][vc_column][vc_column_text]How many passwords would you guess you have? In 2007, the average was 17. It's estimated that by 2020 we will have 207 unique logins... each!* As cybersecurity continues to be a growing concern, more password rules have been created....
6 Biggest Concerns of IT Experts Today
[vc_row][vc_column][vc_column_text]Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it's all for naught. With all of the headlines about ransomware and...
Invasion of the IoT: Your Kid’s Toys Can Spy On You
[vc_row][vc_column][vc_column_text]The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It's a wonderful,...
Move Over Ransomware, Wiperware Is Coming to Town
[vc_row][vc_column][vc_column_text]We've talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most...
5 Principles of Protection for Your SMB
Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren't enough funds to spread around. The flip side of that issue, though, is that...
Digital Forensics Finds Criminal Evidence in Auto-Correct
[vc_row][vc_column][vc_column_text]We live in a world where almost everything we do leaves a digital footprint. We use our phones to help us find where we're going, pick a restaurant for dinner, find a doctor, read the news, shop online, and a million other things....