Blog

5
Mar

The cloud has been a huge shift in technology for small and medium businesses over the last several years.  All indications are that it is an enduring trend.  Businesses access platform and infrastructure capabilities through major providers like Amazon’s AWS, Google Cloud Platform and Microsoft’s Azure.  They also use cloud-based SaaS applications–many of which run […]

2
Feb
GDPR logo

Beginning May 25 of this year, companies that handle data of citizens of the European Union will need to start to comply with The General Data Protection Regulation, better know as GDPR.  These norms protecting personally identifiable information (PII) will be stricter than similar US protections.  They’ll cover items like IP addresses, health information and […]

21
Jan

Technology is constantly evolving, but that doesn’t mean every business needs to jump on the latest fad.  Here are some major trends that businesses should be looking at in 2018. BYOD and MDM Enough acronyms for you?  Well, they both have to do with one word: mobile.  Bring your own device (BYOD) and mobile device […]

18
Dec

2017 is coming to an end.  Seems like it just started!  Anyway, another year is in the books and we’re taking an opportunity to re-cap the biggest cybersecurity stories.  When big malware attacks or breaches occur, it seems like there is a huge amount of intense attention for a short period of time and then […]

27
Nov

There is a significant new ransomware threat wreaking havoc on the internet.  A new version of the so-called Scarab ransomware (first spotted this June) started getting pushed out in a massive spam email campaign on Thanksgiving.  Within a few hours, 12.5 million emails had been sent using the Necurs botnet. The spam emails use the  […]

19
Oct

You Should Have Always Been Careful Using WiFi It’s always been risky to use public WiFi with your sensitive business data.  As one writer has noted, using public WiFi is like having unprotected sex.  WiFi networks are vulnerable to attacks. There have been different encryption standards adopted to help secure WiFi.    WEP (Wired Equivalent […]