News

June 18, 2020

5 Ways to Make Your Virtual Meetings More Effective

Just like with face-to-face meetings, virtual meetings need to be well planned and executed to maximize their usefulness. Here are five ways you can make your […]
April 23, 2020

The GDPR & CCPA Compliant Checklist

While several data privacy laws have come into legislation in certain countries, its safe to globally follow all procedures if your customer database contains address domains […]
February 3, 2020

CCPA is Now in Effect. Are you Compliant?

On January 1st, 2020 the California Consumer Privacy Act (CCPA) went effect for new consumer privacy rights. This empowers consumers with more power against larger businesses […]
December 19, 2019

Company Was Hacked More Than 20 Times Over Nearly 2 Years

For nearly two years, a business was unaware that a cybercriminal was repeatedly hacking its IT systems, which lead to the cybercriminal stealing the personal data […]
November 11, 2019

The E.U. – U.S. Privacy Shield Review is in

The E.U. Commission had their 3rd annual review of the E.U. – U.S. Privacy Shield this October, with the goal to evaluate the compliance of the […]
October 24, 2019

Firefox Mozilla Beta Testing VPN Service

Firefox is testing an extension for browser users that will allow encryption when browsing websites to create a better and secure experience for the user. After […]
September 16, 2019

Critical Security Vulnerability Allows Hackers to Take Over Cisco Routers

A severe security vulnerability in several types of Cisco routers allows cybercriminals to gain full control of the devices. Discover which routers are affected and what […]
August 22, 2019

Windows 10 Mobile Is on Its Way to the Digital Graveyard

Microsoft is ending all support for Windows 10 Mobile devices. Here are some dates you need to remember if you are using this device. Windows Mobile […]
August 15, 2019

How to Determine Which IT Policies Your Company Needs

Having too few or too many IT policies can lead to problems. Here is a common-sense approach you can use to determine which IT policies your […]