[vc_row][vc_column][vc_column_text]The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration...
IT security
Fake Emails to Ignore to Protect Your Cybersecurity
Hackers can be very clever, there's no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here...
[Infographic] The Beastly IT Security Threats – A MUST READ
[vc_row][vc_column][vc_column_text]Data and IT Security are at the forefront of everyone's concerns these days. The news is overrun with headlines about breaches of corporations that you'd imagine would have tremendous security measures in place, but still fall victim...
Is Your Data Security Budget a Waste of Money?
[vc_row][vc_column][vc_column_text]When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have...
5 Ransomware Stats That Will Scare You
[vc_row][vc_column][vc_column_text]We've talked about ransomware a lot in 2016. It's a growing, ever-evolving threat to your data security that you may not be paying enough attention to. Preventing this form of cybercrime takes a combination of robust security,...
Virtual Currency: A Primer and Security Warning
[vc_row][vc_column][vc_column_text] Bitcoin is now so ubiquitous that you’ll frequently hear stories about the world’s most popular virtual currency on the local evening news. Bitcoin and other virtual currencies have exploded in popularity in recent years, yet many...
Top 5 Best Practices for Network Security
[vc_row][vc_column][vc_column_text] The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work...
3 IT Security Failings of the Internet of Things
[vc_row][vc_column][vc_column_text]The seamless synchronization of our multitude of network enabled devices is incredible. They "talk" to each other, sharing and gathering information to help us better understand and control the systems around us. It is the Internet...
Warn Employees Against Ashley Madison Phishing Scams Now
[vc_row][vc_column][vc_column_text] The following is a Phishing Scam Alert from the KnowBe4 blog regarding the Ashley Madison breach, and while it is making 35 million+ people very nervous, it is important as a business owner or IT admin to educate your network's...
Protecting Yourself Against Cyberattacks
[vc_row][vc_column][vc_column_text]Today's post on IT security from cyber attacks is shared courtesy of Todd Pouliot of Gateway Financial, LLC: 25% of Americans were cyberhacked between March 2014 and March 2015. The American Institute of CPAs announced that alarming...