Cybersecurity analysts have discovered a remote access trojan (RAT) known as CronRAT that’s highly sophisticated due to its use of many techniques to avoid detection. For […]
Disguised as legitimate apps, the GriftHorse malware has found its way onto more than 10 million Android devices. Learn how to determine whether your phone is […]
Analysts at Microsoft Security Intelligence have discovered a new variant of UpdateAgent, also known as WizardUpdate. This malware targets Mac devices by impersonating legitimate MacOS software. […]
In our latest blog, we go into the innerworkings of what smart buildings entail, give some advice on how to prevent hacking and also talk about how a Zero Trust solution is the best bet for overall cyber security.
Hypertext Transfer Protocol Secure (HTTPS) is quickly becoming a more popular internet protocol than HTTP for website and application connections. While HTTPS is fast and secure, […]
Google has announced that it will be implementing a number of changes that will affect how billions of users will send email through Gmail. These changes […]
You need a plan in order to get the most out of your technology and to reach your most important business goals. We have a process that's easy to follow and allows us to determine where you are along this journey.
Microsoft has released a new version of its on-premises productivity suite for those customers who are not interested in using cloud-based productivity apps. Find out what […]