by Tom | Sep 29, 2016 | Blog
Regardless of your security protocol, there will always be threats. One of the most often forgotten outlets for attacks comes from insider threats. Sometimes these threats may be from angry employees wanting to sink your business, but more often than not, those behind...
by Tom | Sep 26, 2016 | Blog
There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James...
by Tom | Sep 5, 2016 | Blog
Windows is perhaps the most common workplace computing tool, and hackers have been trying for decades to uncover holes in its security. In some cases, like with unsupported operating systems, they’ve succeeded. However, Microsoft’s latest addition to their OS family,...
by Tom | Sep 2, 2016 | Blog
Payment via mobile devices is still a relatively new concept. With newer smartphones, it’s now easier than ever to pay your bills or send money on a whim. However, this also brings up an important topic; what’s the best way to handle mobile payments, and how can those...
by Tom | Aug 22, 2016 | Blog
It’s clear that security professionals have waged war with hackers since the Internet’s inception, but NATO has reaffirmed that cybersecurity is not just a localized problem; it’s a nation-state-wide issue, and one that needs to be addressed. Just like land, air, and...