Our Blog

March 21, 2022

A Leak has been Detected in Safari 15

Safari 15 implements the IndexedDB API, which introduces a data leak that allows websites to track the user’s internet activity and disclose their identity. FingerprintJS reported […]
March 17, 2022

Don’t Leave Your Cloud App Data Vulnerable

Many companies use cloud apps like Microsoft 365, Google G Suite, and Salesforce without adequately protecting the data within those apps. Learn why this is problematic […]
March 15, 2022

A closer look at data leaks and breaches

What happens when a data leak or data breach occurs? Even the largest organizations are susceptible to them. We take a look at what they are, how hey happen, and how you can prevent them in our latest blog post.
March 14, 2022

That QR Code Could be a Malware Program

Quick Response (QR) codes have become a standard method of conducting contactless transactions during the COVID-19 pandemic. However, cyber criminals are exploiting the lax security that […]
March 10, 2022

Is Your Business Using Older Wireless Devices? Check to See If They’re Using 3G

The major mobile carriers are retiring their 3G networks in 2022. Here is what you need to know. Small and midsize businesses often do not have […]
March 8, 2022

What is Zero Trust and why is it important?

Have you heard of Zero Trust network security strategies? They represent the cutting-edge of internal network security. If your IT strategy doesn't include a Zero Trust strategy you might not be fully protected.
March 7, 2022

Android Malware Attacking Again

Cybercriminals have recently increased their use of banking trojans, which continue to become more effective as they evolve. For example, Brazilian Remote Access Tool Android (BRATA) […]
March 3, 2022

Log4J Bug Leaves Horizon Servers Vulnerable

The Cybersecurity and Infrastructure Security Agency (CISA) and its partners are responding to the widespread exploitation of a critical remote code execution (RCE) vulnerability in Apache’s […]
March 1, 2022

Five common cyber security myths

Ready to separate fact from fiction? Here are five of the most common cybersecurity myths.