Recent Data Breaches You Should Know

Imagine for a second what would happen if your business’ data was exposed and stolen. You’d have a really difficult time going forward as your client base dwindled and your opportunities for growth dried up. Some very successful companies have had this type of thing happen. Today, we will look at some of the largest […]

Protect Smartphones Like Any Other Computer

We go into great depth on how to protect your desktop and laptop computers from malware and other malicious threats. In fact, one of the first steps you take anytime you are setting up a new computer is to install antivirus and other security programs. You do this because an unprotected device presents substantial risk. […]

Software Patching in the Cloud

A lot of computing is done today using cloud computing, which is basically making use of the computing power, space and applications that a provider has on their infrastructure as if they were your own. Doing so can provide a very specific benefit to your security. Have you ever wondered how the cloud itself is […]

Microsoft Releases Rare Bug Fix Off of Regular Patch Schedule

Most of us like to take matters into our own hands, almost to a point where we might refer to ourselves as control freaks. So, when it comes to letting other people or even our own devices update themselves, we tend to click “remind me later” or “don’t ask me again.” Patches, however, are a […]

How Cybercriminals Can Enter Your Google Calendar

Users seem to have a bit of a blind spot when it comes to solutions put out by Google, particularly the risks associated with Gmail. It’s almost odd to say that a security threat leverages Gmail. Unfortunately, it isn’t unheard of, as a phishing scam has been leveraging Gmail and its cooperation with Google Calendar […]

The Truth About Compliance and Cybersecurity

To the average person, there are some definite blurred lines between IT security and IT compliance. In fact, these lines are so blurry to most people that they would consider them the same thing, even though they aren’t. How is it possible to create a fully compliant, completely secure computing environment? You start by understanding […]