Our Blog

September 26, 2019

3 Things to Keep in Mind When Flying with Mobile Devices Powered by Lithium Batteries

Most mobile devices use lithium batteries because they are powerful. However, they can be dangerous, which is why the United States and many other countries have […]
September 19, 2019

How to Protect Your Sensitive Business Files with Passwords

Protecting a file with a password can provide an extra layer of security for sensitive business documents. Learn how to password-protect your files in Microsoft Word, […]
September 16, 2019

Critical Security Vulnerability Allows Hackers to Take Over Cisco Routers

A severe security vulnerability in several types of Cisco routers allows cybercriminals to gain full control of the devices. Discover which routers are affected and what […]
September 12, 2019

4 Common Fees When Storing Data in the Cloud

When shopping for a cloud storage service provider, you need to find out what additional fees might be charged in addition to the base rate. Learn […]
September 9, 2019

New Android Ransomware Spreads Through Forum Posts and Customized Texts

Cyber extortionists have created new ransomware that encrypts files on Google Android devices. Find out how this ransomware infiltrates devices so you can avoid becoming a […]
August 29, 2019

Assess Your Security with the Microsoft Secure Score Tool

Microsoft Secure Score is a free tool that can help you better protect your Office 365 and on-premises Windows 10 deployments. Find out what this tool […]
August 26, 2019

5 Ways to Protect Your NAS Device from Ransomware

Network-attached storage (NAS) devices are common targets of ransomware attacks. Find out why NAS devices are often attacked and what you can do to protect your […]
August 22, 2019

Windows 10 Mobile Is on Its Way to the Digital Graveyard

Microsoft is ending all support for Windows 10 Mobile devices. Here are some dates you need to remember if you are using this device. Windows Mobile […]
August 19, 2019

Fake eFax Messages: A New Spin on an Old Phishing Trick

Hackers are again using fake eFax messages in phishing attacks, but the latest campaign has a new spin. Learn about their latest ploy. In July 2019, […]