Our Blog

August 11, 2021

An Attack that Strips Away SSL (https) Status

Malicious actors have been adding their own servers to the Tor network since January 2020, generally for the purpose of intercepting traffic from users accessing cryptocurrentcy […]
August 9, 2021

The Security Risks Associated with Cookies

Cookies are a common target for hackers because they represent a major vulnerability in web applications. Multi-factor authentication (MFA) is a traditional approach to solving this […]
August 6, 2021

3 Things to Keep in Mind Before Moving More IT Operations to the Cloud

With the future looking brighter, companies are contemplating moving more IT operations to public clouds. Here are three things to keep in mind before doing so. […]
August 5, 2021

5 Lies Cybercriminals Tell to Get You to Click Malicious Links

Every day, people are lured into clicking potentially dangerous links in phishing emails. Here are five lies that cybercriminals tell to get them to click those […]
August 4, 2021

The Apple iOS Update Everyone is Talking About

It’s always exciting whenever Apple releases a new update for the iOS operating system. One of the biggest features to debut alongside iOS 14.0 back in […]
August 2, 2021

Google Introduces Anonymized Data Collection – FLoC

As third-party cookies become obsolete, Google prepares to run test trials of FLoC aka Federated Learning of Cohorts. Cohorts Explained FLoC is designed to collect data […]
July 30, 2021

Tired of Taking Notes in Virtual Meetings? Have the Service Provider Do It for You

Service providers are jockeying for position in the virtual meeting market. To improve their standing, some providers are incorporating live transcription functionality into their virtual meeting […]
July 29, 2021

It’s Time to Say Goodbye to the Internet Explorer Desktop App

Microsoft will be officially retiring the Internet Explorer 11 desktop app in the not-too-distant future. Here is what you need to know if your business is […]
July 28, 2021

New Bills on Capitol Hill After the Colonial Pipeline Attack

The recent ransomware attack against the Colonial Pipeline illustrates the need for a plan to protect the economy in the event of a major cyberattack, according to members […]