Our Blog

October 19, 2020

Ransomware Attack Results in Woman’s Death

With so many hospitals and other healthcare centers being targeted by cyber extortionists, it was only a matter of time before a ransomware attack led to […]
October 15, 2020

5 Ways to Protect Your Computer Data from Natural Disasters

Especially during a time when more people are working remotely than ever due to the ongoing COVID-19 pandemic, it’s important to acknowledge that the data you’re […]
October 12, 2020

Protecting Global Networks and Identifying Threats

As the dark web becomes multi-national, US government agencies are racing to identify who are responsible for the latest ransomware attacks.
October 8, 2020

Securing APIs for Better Business

Creating a secure architecture while developing APIs (Application Programming Interface) is critical for prevention against future cyberattacks.
October 5, 2020

Vishing Scam Is Targeting Telecommuters

A voice phishing (vishing) scam that targets employees working from home is making the rounds. Learn how this scam works and what your company can do […]
October 1, 2020

How to Take Advantage of iPhone’s Text Replacement Feature

Apple iPhones have a built-in text-replacement feature. Although it’s not new or flashy, it can be quite useful. Discover what this feature does and how to […]
September 28, 2020

Big Changes Are Coming Soon for Microsoft Edge Legacy and Internet Explorer 11 Users

Microsoft will be phasing out support for its Edge Legacy and Internet Explorer 11 (IE11) web browsers. Here is what you need to know about the […]
September 24, 2020

Google Releases a version of iPhone AirDrop on Androids

By far, the two most popular smartphone platforms available on the market today are Apple’s iOS and Google’s Android operating systems. iOS, of course, only works […]
September 21, 2020

Remote Desktop Protocol Users have Highest Risk of Ransomware Attacks

As more schools and businesses find themselves going online, Remote Desktop Protocol (RDP) users are more vulnerable than ever to a ransomware attack. Learn more about […]