Blog

Just How Safe is Your Data in the Cloud?

Just How Safe is Your Data in the Cloud?

HomeAn incident first reported last month involving 68 million Dropbox users’ (a cloud service) stolen contact information shed light on cloud security – or, the presence or lack thereof. Even more disconcerting is the fact that the Dropbox hack initially took place…

Read more 

Sony Debuts 4K Security Camera

Sony Debuts 4K Security Camera

HomeSony’s latest security camera comes with a whole host of exciting and innovative features designed to let consumers make the most of their investment. The crystal clear image quality offered by 4K technology outshines it’s HD predecessors, generating more reliable…

Read more 

Hackers Can Spy and Take Screenshots with New Mac Virus

Hackers Can Spy and Take Screenshots with New Mac Virus

HomeA recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab confidential data from computers, is codenamed “Mokes”. Discovered in January of this year by Stefan Orloff of Kaspersky Labs, Mokes was…

Read more 

Yahoo Data Theft Good Reason to Regularly Change Passwords

Yahoo Data Theft Good Reason to Regularly Change Passwords

HomeIn case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts…

Read more 

Two-Factor Authentication with AuthAnvil Provides Better Security

Two-Factor Authentication with AuthAnvil Provides Better Security

HomeHave you heard of two-factor authentication with AuthAnvil? This is an IT management solution many companies have turned to for better data access control and (mobile) device management. Two-Factor Authentication or 2FA is a smart way to ensure your access…

Read more 

Is Your IT in the Cloud?

Is Your IT in the Cloud?

HomeUnderstanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as businesses of all sizes face the ongoing threat of cybersecurity attacks. Many businesses are now…

Read more 

10 Ways to Make the Most of Your Office 365 Migration

10 Ways to Make the Most of Your Office 365 Migration

HomeThere are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of benefitting from moving to the cloud-based service of Office 365, but were you…

Read more 

The Healthcare Industry is Falling Behind on Data Protection

The Healthcare Industry is Falling Behind on Data Protection

HomeThe results of a recent Vanson Bourne Global Data Protection Index study may shock some in the healthcare industry: Only 10 percent of organizations doing business on the Web are “ahead of the curve” on data maturity and security readiness, according to the…

Read more 

Using Two-Factor Authentication to Address Workplace Cyber Threats

Using Two-Factor Authentication to Address Workplace Cyber Threats

HomeTwo-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most directly effective way to combat password hacking and the unauthorized access to company data, software, and devices. Password hacking is becoming more…

Read more 

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

HomeiPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be able to use your camera to spy on you. Although Apple released the patch in the…

Read more