Our Blog

May 29, 2017

Defending Against Cybersecurity Threats in Your Hotel Room

Being on the road is typically a stressful affair. Travelers have to worry about making their flight connections or booking reservations to a hotel or restaurant. […]
May 29, 2017

Has Your Practice Outgrown Your Shared Server?

Most practices quickly realize that they need a server to host their website, internal tools, backups, and other digital services. Initially, to save on startup costs […]
May 15, 2017

WannaCry?

The WannaCry Ransomware has been all over the lately.  Here are the highlights: On Friday, May 12, 2017, the world was alarmed to discover that cybercrime […]
May 15, 2017

6 Ways to Make Your IT Security Training More Effective

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be […]
May 15, 2017

Don’t Let Your Business Become the Next Spear Phishing Victim

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) […]
May 4, 2017

The Dangers Lurking When Employees Use Work Email Addresses for Personal Use

Many companies likely have had their email credentials compromised without realizing it. In September 2016, researchers revealed that they found about 5 million unique business email […]
May 4, 2017

Sophisticated Google Docs Phishing Scam

Phishing Emails have been very prevalent this year. It was recently identified that the latest version is pretending to be a shared file from Google Docs. […]
May 4, 2017

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ […]
April 25, 2017

5 Types of Files You Should Back Up Regularly

Backing up your business files regularly is recommended in case a hard disk suddenly fails, a ransomware attack occurs, or another type of disaster destroys your […]