BLOG

Wannacry Ransomware Continues To Be A Problem For Some

It's been the better part of two years since the outbreak of the Wannacry ransomware epidemic. Unfortunately, all this time later, some companies are still dealing with the fallout. According to the ...

New Internet Explorer Exploit Currently Being Used By Attackers

Are you still using Internet Explorer? Now you have a new reason to consider switching to a more up to date browser. As most people know, Microsoft essentially gave up on Explorer ...

New Amazon Order Confirmation Emails Could Be Phishing Attempts

According to Alexa, Amazon is the 4th most visited website in the United States and ranks 8th worldwide. To say that it gets a lot of traffic every day would be an ...

Should I Shutdown My Computer Every Night?

Are you like me, where this question is routinely hanging out in the back of your mind every time you’re jumping on or off your computer? I finally broke down and ...

Well-Known Tech Support Scam Traced to India

I think we’ve all seen those virus alerts to some degree or another that pop-up on our desktops telling us that we’ve been infected. They’ll typically pretend to be from legitimate ...

Holiday Shopping Scams! Look Out!

How was your Thanksgiving? Great, we hope! How about Black Friday? Cyber Monday? Are you in to those type of things? Personally, I typically avoid these shopping rushes in general, but ...

IT Support: Hire In-House or Outsource?

Small business owners face an important question when it comes to IT support: should I hire an in-house IT employee or work with a vendor? We recently looked at reasons why ...

5 Reasons Why Your Company Should Outsource its IT Support

Companies commonly outsource its accounting and bookkeeping duties, customer service, and HR management… so why should technical support be any different? It shouldn’t. Outsourcing provides a lot of benefits, especially to ...

Your Company’s Data was Hacked – Are You Legally Responsible?

So, who should be held responsible when a company’s data system gets breached? Historically, the CIO, the CISO, or both have shouldered the lion’s share of data breach responsibility; well over ...

Passwords: Not as Secure as You Might Think

We’ve all heard that in order to protect our information and online accounts we need to create complex passwords with uppercase and lowercase letters, numbers, and special characters, right? Following such ...