by Tom | Apr 2, 2018 | Blog
Passwords are still an incredibly valuable part of security, but it’s becoming quite difficult to maximize network security through passwords alone. Even if you somehow manage to sell the idea of network security to your staff, whether or not they follow through is...
by Tom | Mar 30, 2018 | Blog
These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is...
by Tom | Mar 29, 2018 | Blog
Have you ever heard of the physicist Erwin Schrödinger? He is most well-known for explaining a paradox related to quantum physics which involves a cat. Even though the theory behind Schrödinger’s cat is meant to explain something quite different, it can still be...
by Tom | Mar 29, 2018 | Blog
March 31, 2018 is World Backup Day. Data is a commodity, but unlike other commodities–it can be replicated without hurting its value. As a result, data backup has become a critical need for the modern business. World Backup Day has been created to remind people...
by Tom | Mar 28, 2018 | Blog
Inside its casing, your computer contains many parts. While these parts may not be moving, they are hard at work, enabling you to use your computer to accomplish your goals. For today’s Tech Term, we’ll take a closer look at just one, the motherboard, and examine what...
by Tom | Mar 26, 2018 | Blog
The more people use technology, the more they have to deal with the negative aspects of doing so. One of the most prevalent problems users experience today is cybercrime that leads to identity theft. What can you do to prevent this from happening to you? How You Can...
by Tom | Mar 23, 2018 | Blog
The do-it-yourselfers of the world have enjoyed the autonomy that the Internet brings into their lives. They can now look up how-to guides and YouTube videos on how to do just about anything. However, the Internet has also given hackers and other cybercriminals access...
by Tom | Mar 21, 2018 | Blog
There is little that is more satisfying than obtaining a new phone. However, this sense of satisfaction is often undermined by the need to get your applications and data to ensure that your new device has everything you normally use installed. For this week’s tip,...
by Tom | Mar 16, 2018 | Blog
One of the crazy things about hackers is that they will do whatever it takes to ensure that they steal as much information and sensitive data as possible. One of the more innovative ways that hackers spread threats is through spam. Unwanted messages have grown from...
by Tom | Mar 14, 2018 | Blog
Internet browsers, by in large, provide enough security for the average user to come out unscathed. Nowadays, people deal with many more threats than they once did, but by in large, users stay secure when using today’s most popular browsers. Privacy, however, is a...
by Tom | Mar 12, 2018 | Blog
The IRS has issued a warning to tax professionals to step up their cyber security to prevent sensitive taxpayer information from being stolen. CPA firms, large and small, are being targeted by hackers and identity thieves, especially during the high traffic tax...
by Tom | Mar 9, 2018 | Blog
Have you ever felt like someone was watching you while you’re doing your work from somewhere outside of your business’ infrastructure? If you’re working from a remote location, this situation might not be far from the truth. If you’re not using a private connection,...
by Tom | Mar 7, 2018 | Blog
Would you just give your bank account information to anyone who called you up and asked for it? Probably not. For the same reason, you wouldn’t just download attachments from your email messages without a second thought. This can be a dangerous practice, as some of...
by Tom | Mar 5, 2018 | Blog
How many devices find their way into your office every day? In this age of mobile devices, it’s no surprise for each of your employees to have everything from a smartphone or tablet, to wearable technology like a Fitbit. Depending on the type of device, you’ll want to...
by Tom | Mar 2, 2018 | Blog
It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re...