Our Blog

October 10, 2017

What You Need to Consider before Adopting a BYOD Policy

Companies often let employees use their own devices for work. One study by Crowd Research Partners found that 72% of the 800 companies surveyed allow at […]
October 10, 2017

5 Ways to Protect Your Web Browsing Data Now That ISPs Can Sell It

If you live in the United States and you are using a U.S.-based Internet service provider (ISP), you need to know about an important change made […]
October 6, 2017

What You Need to Know about the Equifax Data Breach

In September 2017, Equifax announced that hackers stole the personal data of 143 million U.S. consumers, making it the biggest data breach in 2017 and the […]
October 6, 2017

5 Myths about Ransomware Debunked

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. […]
October 6, 2017

How Hackers Can Infiltrate Your Network through Your Printers

Many businesses connect their printers to a network so that multiple employees can use them to print documents. If all-in-one printers are networked, employees can also […]
September 26, 2017

This Tech Support Scam Can Trick You into Calling a Fake Hotline

Your phone rings. As soon as you say "Hello", the caller identifies himself as a tech support staff member from a well-known tech company. He tells […]
September 26, 2017

What You Need to Know about Adobe Ending Support for Flash

For two decades, Adobe Flash has worked behind the scenes, letting people watch animations, view and listen to streaming content, and play interactive games through their […]
September 26, 2017

Your Guide to Having “The Talk” with Your Team about Passwords

Protecting business accounts with strong passwords is an important part of any company’s security strategy. However, if you simply tell your team to avoid using weak […]
September 13, 2017

Don’t Do This When Cleaning Your Device’s Touchscreen

The touchscreens on smartphones, tablets, and other mobile devices are made to be touched, so getting fingerprints, smudges, and other types of dirt on them is […]