by Tom | Feb 28, 2018 | Blog
With data security becoming paramount for almost everyone, encryption is one of the more important technology terms you will need to know. Since data security has to be a priority–not just for your business–but for you, understanding what encryption is,...
by Tom | Feb 26, 2018 | Blog
A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so,...
by Tom | Feb 23, 2018 | Blog
Think for a minute the power a signature has. Signatures have started and ended wars, they have committed whole nations of people to rule of law, and they are attached to birth and death. For the individual, the signature is one of the most powerful possessions. You...
by Tom | Feb 21, 2018 | Blog
The Internet browser is one of the most utilized applications on most computers. With so many complex and aggressive issues popping up on the Internet it would be useful to know which of today’s most utilized browsers are best at keeping your computing network free...
by Tom | Feb 19, 2018 | Blog
You might be surprised to hear how the scope of the Internet of Things has increased over the past few years. These connected devices are all over the place. In order to ensure that your business isn’t affected in a negative way by these IoT devices, you’ll need to...
by Tom | Feb 16, 2018 | Blog
CES 2018 introduced the world to some downright interesting (and some absurd) electronics. The Consumer Electronics Show gives the technology industry just the outlet to showcase the best and brightest of what manufacturers have to offer. Here are some of the more...
by Tom | Feb 15, 2018 | Blog
When it comes to Android mobile OS-run smartphones, consumers may wonder where the value is when they see so many name brands charging premium prices for their flagship devices. Two of the most popular devices, the Google Pixel and the Samsung Galaxy s7, seem to be in...
by Tom | Feb 14, 2018 | Blog
Keeping your company’s data safe is extremely important no matter where it is stored. Making the decision to store data in the cloud or in an in-house server is just one consideration you need to make. Today, we will compare these two options to help you select the...
by Tom | Feb 12, 2018 | Blog
One of the keys to launching any sort of technology initiative is to have a skilled IT project manager at the helm. As such, it is important to keep certain high standards in mind as you find someone to act in that capacity for your business. Today, we’ll review a few...
by Tom | Feb 9, 2018 | Blog
Do you know who manages and maintains your business’ technology? In most cases, it will be either a small in-house IT department or technical individual, but often times small businesses simply don’t have the assets to throw around on this. More importantly, they...
by Tom | Feb 7, 2018 | Blog
Businesses that work with medical data are in a tricky situation, as the slightest issue with security could place considerable risk on storing this data. If you’re not careful, you could be putting your business at risk. With the compliance issues that have to be...
by Tom | Feb 5, 2018 | Blog
If you’ve heard of blockchain recently, there’s a pretty good chance it was in reference to cryptocurrency. With Bitcoin reaching record levels in December, the idea of using blockchain technology to develop digital currency was on a lot of people’s minds. However,...
by Tom | Feb 2, 2018 | Blog
If there is one thing you know about technology, it’s that it meets its demand. No matter if you are talking about the millions of Internet of Things products being created today, video games and entertainment, or business tech, demand drives the technology market....
by Tom | Jan 31, 2018 | Blog
The Internet of Things has become one of the central parts of connectivity in a tech-centric world. Despite the incredible convenience that these devices offer to users, they come with considerable security risks that absolutely need to be kept in mind. We’re going to...
by Tom | Jan 29, 2018 | Blog
Every so often, it’s nice to hear about when the good guys win and cybercriminals get their comeuppance. Three such cybercriminals have entered guilty pleas to charges related to major cybersecurity events. Mirai Mirai was a malware strain that creates a botnet out of...