Our Blog

April 12, 2022

What’s shakin’ up the world of cybersecurity?

The world of cybersecurity has undergone major change in the past decade. So, what's new in the world of internal systems protection? Learn more in our latest blog!
April 5, 2022

The worst network security breaches of 2021

Some of the worst hacks of 2021 were actually quite sophisticated. Learn what the bad guys are up to in our latest blog.
March 29, 2022

Did the cloud kill the data center?

The cloud has become the most dominant computing platform in the world. And with business moving their data to it in increasing numbers, many wonder if this means the end of the data center.
March 21, 2022

A Leak has been Detected in Safari 15

Safari 15 implements the IndexedDB API, which introduces a data leak that allows websites to track the user’s internet activity and disclose their identity. FingerprintJS reported […]
March 17, 2022

Don’t Leave Your Cloud App Data Vulnerable

Many companies use cloud apps like Microsoft 365, Google G Suite, and Salesforce without adequately protecting the data within those apps. Learn why this is problematic […]
March 15, 2022

A closer look at data leaks and breaches

What happens when a data leak or data breach occurs? Even the largest organizations are susceptible to them. We take a look at what they are, how hey happen, and how you can prevent them in our latest blog post.
March 14, 2022

That QR Code Could be a Malware Program

Quick Response (QR) codes have become a standard method of conducting contactless transactions during the COVID-19 pandemic. However, cyber criminals are exploiting the lax security that […]
March 10, 2022

Is Your Business Using Older Wireless Devices? Check to See If They’re Using 3G

The major mobile carriers are retiring their 3G networks in 2022. Here is what you need to know. Small and midsize businesses often do not have […]
March 8, 2022

What is Zero Trust and why is it important?

Have you heard of Zero Trust network security strategies? They represent the cutting-edge of internal network security. If your IT strategy doesn't include a Zero Trust strategy you might not be fully protected.