by Tom | Sep 12, 2018 | Blog
Uh oh. One of your employees sat down at their workstation and was presented with a pop-up telling them that Microsoft has detected a fatal issue with their workstation, and if they don’t let someone remote in to fix it, all of their data will be lost. This could be a...
by Tom | Sep 3, 2018 | Blog
Thanks to the advent of artificial intelligence, cybersecurity professionals have to reconsider how they approach these threats. Machine learning is one option, as it can help today’s modern solutions learn how to be more effective against advanced threats. On the...
by Tom | Aug 10, 2018 | Blog
What would you do if a stranger claimed to have compromising webcam footage of you and threatened to share it with your contacts? A new, very convincing email scam is making some users very nervous. The Sextortion Scam It’s as screwed up as it sounds. A scammer emails...
by Tom | Aug 1, 2018 | Blog
Security is a necessity. Every technology professional will tell you this, but in an age where employees are taking information on the go, it’s trickier than it’s ever been before. Encryption is one of the ways that businesses are attempting to shore up their...
by Tom | Jun 23, 2018 | Blog
Despite what detractors say, regulations are in place for good reason. They typically protect individuals from organizational malfeasance. Many of these regulations are actual laws passed by a governing body and cover the entire spectrum of the issue, not just the...