Our Blog

September 16, 2019

Critical Security Vulnerability Allows Hackers to Take Over Cisco Routers

A severe security vulnerability in several types of Cisco routers allows cybercriminals to gain full control of the devices. Discover which routers are affected and what […]
September 12, 2019

4 Common Fees When Storing Data in the Cloud

When shopping for a cloud storage service provider, you need to find out what additional fees might be charged in addition to the base rate. Learn […]
September 9, 2019

New Android Ransomware Spreads Through Forum Posts and Customized Texts

Cyber extortionists have created new ransomware that encrypts files on Google Android devices. Find out how this ransomware infiltrates devices so you can avoid becoming a […]
August 29, 2019

Assess Your Security with the Microsoft Secure Score Tool

Microsoft Secure Score is a free tool that can help you better protect your Office 365 and on-premises Windows 10 deployments. Find out what this tool […]
August 26, 2019

5 Ways to Protect Your NAS Device from Ransomware

Network-attached storage (NAS) devices are common targets of ransomware attacks. Find out why NAS devices are often attacked and what you can do to protect your […]
August 22, 2019

Windows 10 Mobile Is on Its Way to the Digital Graveyard

Microsoft is ending all support for Windows 10 Mobile devices. Here are some dates you need to remember if you are using this device. Windows Mobile […]
August 19, 2019

Fake eFax Messages: A New Spin on an Old Phishing Trick

Hackers are again using fake eFax messages in phishing attacks, but the latest campaign has a new spin. Learn about their latest ploy. In July 2019, […]
August 15, 2019

How to Determine Which IT Policies Your Company Needs

Having too few or too many IT policies can lead to problems. Here is a common-sense approach you can use to determine which IT policies your […]
August 12, 2019

Have an Android Smartphone? Beware of Agent Smith

Agent Smith is frightening Google Android users around the world. This malware has replaced legitimate apps with malicious versions on 25 million Android devices. Here is […]