Our Blog

January 3, 2022

3 of the Most Troubling Cyberattacks in 2021

Cybercriminals were very busy in 2021. Here are three of the most troubling cyberattacks they perpetrated. The year 2021 was a busy year for cybercriminals — […]
December 30, 2021

CronRAT is Scheduling Linux Actions for February 31st

Cybersecurity analysts have discovered a remote access trojan (RAT) known as CronRAT that’s highly sophisticated due to its use of many techniques to avoid detection. For […]
December 28, 2021

Are you teaching your employees good cyber security habits?

Did you know that we offer CyberSecurity Employee Education? Well-trained employees are the first line of defense against a cyber attack.
December 27, 2021

10 Million Android Devices Have Been Infiltrated by GriftHorse Trojan Apps

Disguised as legitimate apps, the GriftHorse malware has found its way onto more than 10 million Android devices. Learn how to determine whether your phone is […]
December 23, 2021

UpdateAgent is Back with a Vengeance

Analysts at Microsoft Security Intelligence have discovered a new variant of UpdateAgent, also known as WizardUpdate. This malware targets Mac devices by impersonating legitimate MacOS software. […]
December 21, 2021

The potential threat of smart buildings to cybersecurity

In our latest blog, we go into the innerworkings of what smart buildings entail, give some advice on how to prevent hacking and also talk about how a Zero Trust solution is the best bet for overall cyber security.
December 20, 2021

Website Security: HTTPA over HTTPS

Hypertext Transfer Protocol Secure (HTTPS) is quickly becoming a more popular internet protocol than HTTP for website and application connections. While HTTPS is fast and secure, […]
December 16, 2021

Google’s new Gmail Announcement to Affect Billions

Google has announced that it will be implementing a number of changes that will affect how billions of users will send email through Gmail. These changes […]
December 14, 2021

Strategy is a process – how to reach your tech goals

You need a plan in order to get the most out of your technology and to reach your most important business goals. We have a process that's easy to follow and allows us to determine where you are along this journey.