[vc_row][vc_column][vc_column_text] October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners - including the National Cyber Security Alliance (NCSA) - to raise awareness about the vital...
Network Security
What the Three Little Pigs Can Teach Us about Cybersecurity
[vc_row][vc_column][vc_column_text]Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity. Probably everyone in the audience is familiar with the tale,...
Legal Industry Late to the Cloud, But They’re Coming.
[vc_row][vc_column][vc_column_text] In the early years, cloud computing was taken on by the innovators and early stage adopters. Then, as with any new tech, it spread to the mainstream. But, there are always the old guard. The ones distrustful of change. Those with...
Is BYOD a Threat to Your I.T. Security?
[vc_row][vc_column][vc_column_text]Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”. While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s...
Holiday Travel Tip for Workers on the Go: Protect Your Data
[vc_row][vc_column][vc_column_text] Whether you're traveling for business or pleasure, it's likely you're logging in for work while on the move. Whether it's on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays....
The Latest & Greatest in WiFi Routers for Your Home
[vc_row][vc_column][vc_column_text] Whether you’re dealing with slow speeds or WiFi dead zones, a new router can improve your internet experience. Reviews.com spoke with networking experts and WiFi geeks to get to the root of what matters.Their top picks come with the...
Hackers Build Backdoor into CCleaner App
[vc_row][vc_column][vc_column_text]A new hack has been announced and it's affecting over 2 million users. The infected application is called CCleaner and it's one that even we have mentioned in the past because it's free and works well to run file clean up to remove...
What to Do in the Wake of the Equifax Security Breach
[vc_row][vc_column][vc_column_text]The Equifax breach is a big one. The company holds the credit reports of over 143 million US consumers, and those reports have all our most valuable information. They are suggesting that you should not wait to determine if your...
6 Biggest Concerns of IT Experts Today
[vc_row][vc_column][vc_column_text]Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it's all for naught. With all of the headlines about ransomware and...
Invasion of the IoT: Your Kid’s Toys Can Spy On You
[vc_row][vc_column][vc_column_text]The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It's a wonderful,...