[vc_row][vc_column][vc_column_text]You've heard about the Bring-Your-Own-Device (BYOD) revolution in the work place. It certainly has its benefits. We are on our smartphones at home and at work and use them everywhere else we go. It makes life so easy! All of our work...
Network Security
Google Amps Up Internet Security For Everyone
[vc_row][vc_column][vc_column_text] There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing....
How To Defend Your Network Security from 5 Wi-Fi Attacks
Network Security is serious business. There are many ways intruders can get into your network. Strong passwords are a great place to start defending your network, but you need to take it to the next level. Here are five ways Wi-Fi attacks occur and how to prevent them...
Network Security Tip: 3 Reasons to Update Your Internet Browser
[vc_row][vc_column][vc_column_text] In our fast-paced technological world, updates are a necessary evil. They take up time, and sometimes they can change things we like, or change the way our apps work. Those can all lead to frustration. Does that mean we should just...
8 Network Security Practices Your Staff Needs To Know
[vc_row][vc_column][vc_column_text]Almost every business now stores at least some of its data digitally, with many organizations attempting to move entirely to paperless record keeping. This is allowing businesses to be leaner and more thorough in their data...
Network Security Tip: Quit Changing Your Password!
[vc_row][vc_column][vc_column_text]Passwords are incredibly important, which is why almost EVERYTHING you access requires them. They are the first line of defense to your data. Best practices for password creation tell us to include a combination of lower and upper...
Medium Sized Businesses Targeted Due to Poor Network Security
[vc_row][vc_column][vc_column_text]Hackers, like the viruses they create, adapt at alarming rates. The newest adaptation involves a focus shift to medium sized businesses for cyber attacks. Big companies have the budget to install top line security measures and full...
Top 5 Best Practices for Network Security
[vc_row][vc_column][vc_column_text] The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work...
Second Hospital Network Security Breach by Ransomware in Just Two Months
[vc_row][vc_column][vc_column_text] Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took...
Hospital Pays Ransom to Hackers in Network Security Breach
[vc_row][vc_column][vc_column_text]Earlier this month, A California hospital's IT systems were taken hostage for an entire week. The hackers inserted ransomware into the hospital's network causing them to lose control of all of their IT systems and demanded $17,000 in...