Our Blog

May 15, 2017

WannaCry?

The WannaCry Ransomware has been all over the lately.  Here are the highlights: On Friday, May 12, 2017, the world was alarmed to discover that cybercrime […]
May 4, 2017

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ […]
May 4, 2017

Sophisticated Google Docs Phishing Scam

Phishing Emails have been very prevalent this year. It was recently identified that the latest version is pretending to be a shared file from Google Docs. […]
May 4, 2017

The Dangers Lurking When Employees Use Work Email Addresses for Personal Use

Many companies likely have had their email credentials compromised without realizing it. In September 2016, researchers revealed that they found about 5 million unique business email […]
April 25, 2017

A Simple but Effective Way to Combat Ransomware Attacks

The number of ransomware attacks against businesses skyrocketed in 2016, and security researchers do not expect a slowdown anytime soon. They are also predicting that ransomware […]
April 25, 2017

5 Types of Files You Should Back Up Regularly

Backing up your business files regularly is recommended in case a hard disk suddenly fails, a ransomware attack occurs, or another type of disaster destroys your […]
April 25, 2017

5 Problems That You Can Solve With Effective Document Management

Some people will tell you that there is only one constant in this world: change. Businessmen, on the other hand, will tell you that there’s at […]
April 11, 2017

Cybercriminals Are Posing as Job Applicants to Spread Ransomware

If your business is hiring, you should be aware of a new phishing attack in which cybercriminals are posing as job applicants. Falling victim to this […]
April 11, 2017

11 Ways to Secure Your Business’ Wireless Network

Wireless networks are popular in small and midsized businesses because they are easy to set up and convenient to use. However, if a wireless network is […]