Internal Breaches On The Rise For Many Companies
In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make the headlines are the
Insights and tips to keep your IT ahead of the curve
In some important ways, the media has a tendency to distort the reality where hacking and data breaches are concerned. The stories that tend to make the headlines are the
Although a number of tech companies have been working hard to create new and ever more robust security and authentication protocols, a recent survey revealed that the American public in
You probably don’t know the name Benson Leung. He’s one of the internet’s unsung heroes, and in recent months, he’s been quietly waging a one-man war against manufacturers producing faulty
There has been an explosive growth in companies offering private cloud as part of a broader offering of managed services, and businesses are responding positively to the trend. Interestingly, while
Sage, LLC, a British company providing business software solutions for clients around the world, was the latest victim of a data breach. This one, however, came from inside the company
What do you do when you get a popup window generated by some piece of software you use, informing you of a critical update? Do you stop what you’re doing
You’ve probably seen the headlines. This year, hardly a week goes by that there isn’t a report of a company in some way connected to the health care industry falling
Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem
Adobe’s beleaguered Flash player may finally be seeing its last days, at least if Google has anything to say about it. The player has been exceedingly popular, and at its
Microsoft is a company that definitely understands the need for better and more secure information systems. Like many other tech companies, they’ve been pushing hard for two-factor authentication protocols covering
Remember not long ago, when the big credit card issuers went on at some length touting their latest advances in smart chip technology? The new tech was supposed to vastly
There have been a number of scams in recent years involving malware that creates false flag problems on your desktop. The faux problem is presented, along with a phone number