It’s not too late to cash in on 2017’s IT trends

“Fad” is a dirty word for many small-business owners. Whether it’s what they’re selling or what they’re investing in, business owners need long-term and reliable investments to secure their future. With 2017 in the rearview mirror, we finally know what was a fad and what was a smart investment. See for yourself! Small businesses love […]

What you need to know about VPNs

With stories of large-scale data breaches and internet service providers tracking internet habits, online privacy is becoming a rare commodity. Incognito mode and private browsing features may be able to cover up your browsing history, but they don’t completely protect your online activities. You need a Virtual Private Network (VPN). What is VPN? Simply put, […]

Cyber weapons for sale by dangerous hackers

“Script kiddies” are a type of computer hacker that copies malware programs from more experienced creators and put their own name on it. WannaCry was programmed by script kiddies, and the group they stole the malware from is selling a new set of vulnerabilities. Who are the ShadowBrokers? There are several theories about who the […]

Ransomware targets Android devices

By now, most people know what ransomware is: malicious software that threatens to publish or erase its victims’ data unless they pay a ransom. But with the surge in mobile device computing, it was inevitable that ransomware would adapt to find new victims. Let’s discuss how it works and what you can do to prevent […]

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]

Ways to protect your company mobile devices

Mobile devices can’t accomplish everything that desktops and laptops can, but that doesn’t mean they’re not important to businesses. More and more employees are using smartphones and tablets to increase productivity and enhance collaboration. But before you adopt a mobile device policy, you must keep them safe from cyber criminals. Cyber criminals now have more […]

Malware targeting MacOS steals bank logins

Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers. Take a minute to find out how it works so you can avoid making a costly mistake. OSX.Dok […]

Microsoft issues security patch for XP

When a Microsoft product reaches its “end-of-life,” the tech developer no longer provides feature updates, technical assistance, and automatic fixes for that product. Support for Windows XP, for instance, ended in April 2014. That said, recent malware attacks have caused Microsoft to continue support for their outdated operating system. Read on to find out more. […]

NSA to secure phones with virtualization

Corporate smartphones and tablets store a significant amount of valuable data. Combine that with their mobile nature and they’re particularly vulnerable to being compromised or stolen. Everyone, including the National Security Agency (NSA), is looking for the next big thing in mobile security, and it might just be virtualization. US government approved The NSA maintains […]