Our Blog

November 19, 2021

How Zero Trust prevents breaches in endpoint folders

Finding a simple yet effective solution for preventing breaches in endpoint folders can be a challenge. It's best to use Zero Trust methodology to ensure the highest security possible.
November 18, 2021

How to Find Out if your Phone Has Spyware

Spyware is an application that allows a hacker to remotely access information on a computing device such as a smartphone. Finding spyware on your phone can […]
November 16, 2021

The right way to combat ransomware threats

Prepping for ransomware threats should be top-of-mind for any executive, no matter the type of business. We're sharing a primer on how to plan the right way for the best security.
November 15, 2021

The New ZLoader Ransomware Variant

Search engines like Google are displaying search results that redirect the user to malicious links when they search for TeamViewer remote desktop software. These links download […]
November 11, 2021

The iOS 15 Update is Here. The Good, the Bad, & the Ugly

iOS 15.0 is the current major version of the iOS mobile operating system (OS) that Apple uses for its iPhone and iPod Touch products. The firm […]
November 8, 2021

FBI Issues Warning for Critical Zoho Bug

A joint effort by multiple US government agencies has discovered a security threat that exploits Zoho’s ManageEngine ADSelfService Plus, a self-service password management solution with a […]
November 4, 2021

Three Extremely Risky Practices to Avoid

A common question among businesses looking to improve their cybersecurity defenses is “Where should we focus our efforts?” A good place to start is to make […]
November 2, 2021

CHIPS means practical solutions: A look at two case studies

In our latest blog, two of our clients talk about their challenges and how solutions provided by our team at CHIPS helped them achieve their goals. 

October 28, 2021

China’s New Data Policy & What It Means

China enacted the Personal Information Protection Law (PIPL) on August 21, 2021 as part of that country’s growing scrutiny of its high tech sector. This law […]