by Tom | Nov 29, 2019 | Blog
Antivirus developer Trend Micro is doing some damage control after an ex-employee stole customer data and sold it to online scammers. These scammers have been calling Trend Micro customers. If you use Trend Micro, it’s best to be wary of any calls you get. How Does...
by Tom | Oct 30, 2019 | Blog
It is a well-established and widely-known fact that your employees are some of the biggest threats to your business via the technology that they use each and every day. If your employees aren’t aware of the practices and policies that they need to follow to prevent...
by Tom | Oct 25, 2019 | Blog
Users seem to have a bit of a blind spot when it comes to solutions put out by Google, particularly the risks associated with Gmail. It’s almost odd to say: a security threat leverages Gmail. Unfortunately, it isn’t unheard of, as a phishing scam has been leveraging...
by Tom | Oct 23, 2019 | Blog
To the average person there are some definite blurred lines between IT security and IT compliance. In fact, these lines are so blurry to most people that they would consider them the same thing. They aren’t. How is it possible to create a fully compliant, completely...
by Tom | Oct 21, 2019 | Blog
If you are concerned about your business’ ability to keep its network secure and data protected, you’re not alone. More businesses than ever are utilizing modern strategies to ensure that their networks are safe, their hardware is stable, and that their data...