by Tom | Oct 28, 2016 | Blog
While the explosion of technological advancement has been great for business, it’s become more challenging than ever before to keep sensitive information safe–even if all you use is an Internet connection. Even small healthcare offices are feeling the effects of...
by Tom | Oct 28, 2016 | Blog
The last time you reached out to IT support, how long did it take them to respond to your request? Did they have to drive all the way to your office, only to resolve the issue far too late? Being able to take prompt action is key to alleviating IT issues, especially...
by Tom | Oct 10, 2016 | Blog
Today’s cars are equipped with more complicated computer systems that allow users access to cutting-edge technology and services. Due to the increasing number of cyber attacks on computerized cars, Volkswagen has chosen to team up with three Israeli cybersecurity...
by Tom | Oct 3, 2016 | Blog
Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft–by no less than the Secret Service. Machines in Connecticut and Pennsylvania have been...
by Tom | Sep 29, 2016 | Blog
What would you do if a significant sum of money magically disappeared from your account due to a “miscommunication” between accounting and someone pretending to be you? Wire transfers have made it extraordinarily easy for scam artists to make large transactions, which...