Our Blog

June 20, 2019

7 Ways Businesses Can Use Office 365 More Securely

Microsoft Office 365 has become a popular target for hackers. Here are seven measures your company can take to keep them at bay if you are […]
June 17, 2019

Running WhatsApp on Your Smartphone? Make Sure It Has the Latest Update

  A dangerous security vulnerability has been found and exploited in WhatsApp. Here is what you need to know. A security hole in the WhatsApp messaging […]
June 13, 2019

Nearly 1 Million Windows Computers Have Serious Vulnerability

If any of your business’s computers are running older versions of Windows, you need to make sure they receive a patch that fixes a vulnerability known […]
June 6, 2019

Software Supply Chain Attacks Are on the Rise

Software supply chain attacks are becoming more widespread. Learn what they are and how they occur so you can develop a strategy to help manage the […]
June 3, 2019

Watch Out for This Direct Deposit Scam

Cybercriminals are trying to scam businesses into depositing employee paychecks into their bank accounts. Learn about the variations of the scam and what you can do […]
May 30, 2019

Why You Need Both a Disaster Recovery Plan and a Business Continuity Plan

It’s not uncommon for companies to think that disaster recovery and business continuity plans are one and the same. Learn why both plans are needed. Tornados, […]
May 28, 2019

All It Took Was 52 Seconds for Hackers to Attack a Poorly Secured Server

Researchers set up honeypots to learn how cybercriminals find and attack poorly protected Secure Shell (SSH)-enabled servers. Learn what the researchers found so you can protect […]
May 23, 2019

SaaS, IaaS, and PaaS: What’s the Difference?

You have probably seen the acronyms SaaS, IaaS, and PaaS before, but do you know what they mean? Discover what these acronyms represent and, more important, […]
May 20, 2019

Don’t Let Your Phone Stalk You

Stalkerware is legal but often considered unethical. Find out what stalkerware is and how it can get on your smartphone. The idea of someone tracking your […]