Our Blog

October 17, 2017

How Former Employees Can Pose a Big Threat to Your Data

Data breaches instigated by former employees do not gain as much media exposure as those caused by cybercriminals. However, these insider attacks can pose a significant […]
October 17, 2017

Microsoft Will Soon Stop Supporting Many Business Apps

Many Microsoft business apps are reaching the end of their lifecycles in the fourth quarter of 2017 and in 2018. When the apps reach that point, […]
October 10, 2017

5 Ways to Protect Your Web Browsing Data Now That ISPs Can Sell It

If you live in the United States and you are using a U.S.-based Internet service provider (ISP), you need to know about an important change made […]
October 10, 2017

What You Need to Consider before Adopting a BYOD Policy

Companies often let employees use their own devices for work. One study by Crowd Research Partners found that 72% of the 800 companies surveyed allow at […]
October 10, 2017

Locky Ransomware Is Back in a Big Way

After taking a brief hiatus, cybercriminals launched four new Locky ransomware attacks in August 2017. The biggest one occurred on August 28. In a span of […]
October 6, 2017

How Hackers Can Infiltrate Your Network through Your Printers

Many businesses connect their printers to a network so that multiple employees can use them to print documents. If all-in-one printers are networked, employees can also […]
October 6, 2017

5 Myths about Ransomware Debunked

In May 2017, the WannaCry ransomware infected more than 230,000 computers in over 150 countries, making it the largest cyberextortion scheme to date, according to CNET. […]
October 6, 2017

What You Need to Know about the Equifax Data Breach

In September 2017, Equifax announced that hackers stole the personal data of 143 million U.S. consumers, making it the biggest data breach in 2017 and the […]
September 26, 2017

Your Guide to Having “The Talk” with Your Team about Passwords

Protecting business accounts with strong passwords is an important part of any company’s security strategy. However, if you simply tell your team to avoid using weak […]