Our Blog

May 16, 2019

5 Things to Consider When Choosing a Password Manager for Your Business

Using a password manager is an effective way to ensure that employees use unique, strong passwords for online accounts. Here are five questions to answer so […]
May 13, 2019

What You Need to Know about Foldable Phones

Foldable phones have been stealing the tech spotlight recently, but are they really all they’re cracked up to be? Here is what you need to know […]
May 9, 2019

How to Choose the Default Apps Windows 10 Uses for Certain Tasks

Having more than one web browser or email app on a computer is common nowadays. When more than one app can be used for a certain […]
May 6, 2019

Regular Security Updates to End for SQL Server 2008 and SQL Server 2008 R2

Microsoft is ending support for SQL Server 2008 and SQL Server 2008 R2 in July 2019. If you are still using this database software, here are […]
May 2, 2019

How to Stop Samsung’s Flagship Phone from Waking Up In Your Pocket

Some Galaxy S10 and Galaxy S10 users are reporting that their smartphones are waking up in their pockets. Find out why this is occurring and what […]
April 29, 2019

Hackers Infiltrated Citrix Using a Password Spraying Attack

A group of hackers used a password spraying attack to compromise Citrix’s internal network. Learn what password spraying is and how to defend against it. If […]
April 25, 2019

Are Your Employees Inadvertently Exposing Your Company’s Sensitive Data?

The ease in which employees can now share information coupled with current cultural trends is causing accidental data leaks in many businesses. Learn how to prevent […]
April 22, 2019

Hackers Are Hunting for Bigger Game with New Version of Ransomware

Pinchy Spider and GandCrab sound like scoundrels in a super-hero comic book, but they are real-life villains in the business world. Learn how to defend your […]
April 19, 2019

Debunking 4 Common Myths about Complying with Data Privacy Regulations

Regulations that protect people’s privacy and data rights are becoming more common — and so are the myths about complying with them. Here are four myths […]