by Bob Martin | Dec 21, 2017 | BYOD, Cyber Security, Data Security, IT security, Network Security
Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”. While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s data. GROWING IN POPULARITY BYOD had...
by Bob Martin | Dec 12, 2017 | Cyber Security, Data Backup, Data Protection, Data Recovery, Data Security, IT security, Network Security
Whether you’re traveling for business or pleasure, it’s likely you’re logging in for work while on the move. Whether it’s on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays. Hackers know...
by Bob Martin | Sep 28, 2017 | Cyber Security, Data Security, IT security, Malware, Network Security, ransomware
A new hack has been announced and it’s affecting over 2 million users. The infected application is called CCleaner and it’s one that even we have mentioned in the past because it’s free and works well to run file clean up to remove clutter from your...
by Bob Martin | Sep 5, 2017 | Cyber Security, Data Security, IT security
In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to send phishing emails. Want to learn...
by Bob Martin | Jul 25, 2017 | Antivirus, Cyber Security, Data Security, HIPAA Compliant Cloud, HIPAA Risk Assessment, IT security, Network Security, ransomware
Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it’s all for naught. With all of the headlines about ransomware and major breaches, cybersecurity is...
by Bob Martin | Jul 21, 2017 | Cyber Security, Data Security, Internet of Things, IT security, Network Security
The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It’s a wonderful, magical symbiotic interaction in a...