While we don’t want to have a stranglehold on your employees or the tools they use, we do want you to know what the pros and cons are and how using the cloud can expose you and your company to risk and added expense.
Category Archives: Security
Microsoft isn’t the only company actively protecting U.S. citizens from foreign hackers. Aside from the threat to the upcoming U.S. midterm elections, which Microsoft is handling with free cybersecurity applications, there is a likely chance of cyberattacks against U.S. electrical grids. But Xage, a blockchain-protected security platform for industrial IoT, has announced a new policy […]
There are two types of businesses out there. Those who realize they have been hacked and those who don’t. Unfortunately, 76 universities and a handful of ride-sharing apps were in the “those who don’t know” category. But they’ve since been upgraded. Regrettably, the threat group acting against these universities wanted intellectual property from particular resources, […]
As the United States prepares for the midterm elections in November, Microsoft has some reassuring news for us. They are going to offer free cybersecurity applications and tools to political candidates, campaign organizations, and technology vendors, as long as they already use Office 365. Having already dealt with “espionage-related phishing attacks” this past year, Microsoft […]
You must get more aggressive in protecting your business. Remember where you and your data live – in the middle of the world’s most densely populated, open, and potentially threatening environment.
As summer comes to a close, students are returning to school equipped with mobile phones, tablets, and laptops. Despite the classroom benefits of technology, there are many risks affiliated with it. And they are a big deal. Normal computer security features are sufficient for adults, but children have a natural curiosity and want for knowledge. […]
Amidst thousands of cybersecurity attacks, most of us don’t turn to our printers believing they might have turned against us (with the help of some hackers, of course). Maybe the occasional paper jam occurs, leaving us frustrated, but the reality is that we don’t suspect printers because they don’t seem technologically advanced enough to be […]
Google Solves Your Password Problem – Only Less Secure Than They Solved it for Themselves
The Diffie-Hellman (DH) key exchange, a “method of securely exchanging cryptographic keys,” acted as the weak spot in Bluetooth pairing.
Hey Siri, who’s Bixby? Bixby, what does Cortana do? Cortana, do you like Alexa? Alexa, are you and Google friends? Ok Google, what’s with all these new digital assistants?
- 1
- 2