by Tom | Aug 4, 2023 | Blog, Security
We aren’t shy in terms of talking about phishing, its dangers, and what can be done to prevent it. However, it can be too easy to focus directly on email phishing and exclude the many other forms that phishing can and often does take. Take, for instance, smishing....
by Tom | Dec 7, 2018 | Blog
Mobile devices have made conducting business much more convenient, as the right application can allow transactions to be made from anywhere you may be reading this blog. However, this increased accessibility has come with a price – threats to mobile security...
by Tom | Jul 6, 2018 | Blog
As technology has improved in function and convenience, we seem to demand more and more of it at an increasing pace. Take mobile data as an example: 4G was introduced in 2009, and less than a decade later, there is high demand for 5G. Unfortunately, while 5G has been...
by Tom | Apr 20, 2018 | Blog
Smartphones have steadily increased in their capabilities, and as they have done so, they have resultantly gathered more and more data that needs to be secured against potential security threats. Fortunately, there are also more ways to protect your smartphone than...
by Tom | Aug 5, 2016 | Blog
There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect...