What is a Watering Hole Attack?
The terminology of online security threats continues to change, and the creative naming can be both ambiguous and explanatory. The most recent concern being Watering Hole Attacks, which are an
Insights and tips to keep your IT ahead of the curve
The terminology of online security threats continues to change, and the creative naming can be both ambiguous and explanatory. The most recent concern being Watering Hole Attacks, which are an
Just a few days ago, a free update came to the iPhone, and if you’ve downloaded it, you’ve probably noticed just how much it changes the iPhone. While you’re exploring
Attacks on web users are becoming all too common. Kaspersky Lab’s senior security researcher, Fabio Assolini, says “[The user] needs to know that an extension can access everything you do
We all have certain apps we like to use and that we use for business and for pleasure. However, we don’t think of everything on our own, and sometimes knowing
Does your office battle with organization? Does paperwork get lost going from one person to another mysteriously, only to show up weeks later in a pile you didn’t know existed?
Two of the biggest security breaches in history have come, not from any hacking or spyware, but from the common household USB thumb drive. Yes, the one we all have
Computers are highly essential for business operation today. Some businesses are more dependent than others, but all are equally reliant on technology working. Certain federal and state laws require certain
On April 8th, 2014, Windows XP support will be completely discontinued by Microsoft. This includes security updates as well, which means if you’re still using XP, it’s time to consider
We’ve all been there – we’ve accidentally deleted something and then emptied the recycle bin before we even realized it was there. Sometimes it’s not that simple and data is
Times have changed, it’s true, but that doesn’t mean attempts to hack your computer are gone. While computer security has gotten stronger in the past decade, so have viruses, spyware,
The FBI has published a warning that they have seen an increase in criminals who use spear-phishing to attack and gain access to private computer networks. Access is then used
Office break-ins happen, and even in this day and age, they aren’t always digital. Sometimes people physically break in to an office, shattered windows and all. While you can’t do