Looking for Something Specific?
Search the Blog Archives.
With the rising number of cyber thefts in the US, numerous lawsuits have been filed against businesses and organizations. In general, the public expects that their bank will take sufficient action to stop data theft. We expect this of the federal government, credit card companies and retail stores as well.
Social is here to stay. That’s the unanimous sentiment regarding social media as a communication tool – and as a marketing channel. LinkedIn launched publicly before Facebook (2003 and 2006, respectively), and in these past 15 years we’ve seen an evolution, and some might say a revolution.
Technological advancements have, without a doubt, had a positive impact where your business is concerned. But they have also led to hacking, data breaches and the likelihood that rogue employees will use tools to jeopardize the security of your data. What is a Rogue Employee?
If you think that all telephone services are equal and that there’s no difference between a business phone and a home phone system, you’d be wrong. In fact, there are several differences between a phone used for business and a phone used for personal calls, including required call features, calling abilities, and even how many […]
Intel processors are having a Meltdown while AMD and ARM are being attacked by a Spectre. Is a James Bond villain making our computers freak out? No, it’s a new vulnerability found within these processors that affects Windows PCs, Linux, Mac, and even Android phones.
Did you know that in 2016, IBM found that 60% of all cyber attacks were carried out by insiders? Of these three quarters were due to malicious intent, and one fourth due to negligence or error. Accidents: According to Verizon’s 2016 Data Breach Incident Report, accidents accounted for 30% of security incidents.