Our Blog

February 6, 2020

5G: The Race is On

In the United States, the four main wireless carriers are rolling out 5G services. Find out what they are offering and how fast their 5G service […]
February 3, 2020

CCPA is Now in Effect. Are you Compliant?

On January 1st, 2020 the California Consumer Privacy Act (CCPA) went effect for new consumer privacy rights. This empowers consumers with more power against larger businesses […]
January 30, 2020

4 Trends to Track in 2020

It is important for companies to keep track of IT developments that can affect their businesses. Here are four trends to watch in 2020. The IT […]
January 27, 2020

Have a WordPress Site? Watch Out for WP-VCD

In the latter half of 2019, malware known as WP-VCD was installed on more new WordPress sites than any other malware — and this trend is […]
January 23, 2020

Update Your iPhone or iPad to Patch the AirDoS Bug

If your iPhone or iPad is not running the latest system software, you could fall victim to an attack that could make your device temporarily unusable. […]
January 20, 2020

Hackers’ Newest Trick Hides Ransomware While It Encrypts Victims’ Files

A ransomware variant known as Snatch is now more dangerous than ever. Learn about the newest trick that cybercriminals are using to make this ransomware harder […]
January 6, 2020

Flaws in Qualcomm Chipsets Are Leaving Android Devices Vulnerable

The Qualcomm chipsets in many Android smartphones have vulnerabilities that could let cybercriminals gain access to passwords and other highly sensitive data stored in the devices. […]
December 30, 2019

How to Use Your Laptop’s Bluetooth Connection Securely

Using Bluetooth to connect devices to your laptop is convenient but also risky. Discover what those risks are and how to minimize them. Many laptops come […]
December 23, 2019

6 Things to Consider When Choosing an Anti-Spyware App

Cybercriminals use spyware to record keystrokes, copy files, read emails and much more. One of the best ways to keep spyware off your devices is to […]