May 29, 2018 | IT Security
Advances in wireless technology have dramatically changed how we utilize the internet. Now, we can access the internet from nearly anywhere and via a long list of devices, from smartphones and tablets to even automobiles. The caveat that comes with this greater...
May 22, 2018 | IT Security
Social engineering attacks can put your company at risk. Although they frequently involve the use of email, there are several varieties that do not require emails. An example is a “misplaced flash drive.” In this type of attack, the hacker will “accidentally” leave a...
May 8, 2018 | IT Security
Did you know that a lot of intellectual theft occurs when a person simply steps away from a computer or leaves drives laying around? It’s true. HR and finance teams are significant targets because of the information that is kept on their machines. The information is...
May 1, 2018 | IT Security
We live in a world where cyber thieves are constantly seeking personal information that they can use for their own personal gain. To do this, they use many advanced techniques to steal your data. Ensuring that you have secure passwords protecting your personal...
Aug 19, 2014 | IT Security
Public Wi-Fi is almost everywhere nowadays. Coffee shops, libraries and even airports have installed hotspots to feed the growing demand for ubiquitous Wi-Fi. While convenient to use, there are hidden security risks you should know about. 1. Packet Sniffing Remember,...
May 13, 2014 | IT Security
Phishing scams are nothing new in the security industry. Typically, they involve a poorly written email that points you to an awful clone site of Paypal or eBay. For most of these scams, you can’t help but to notice the obvious warning signs — misspelled...