by admin | Feb 2, 2018 | blog
Doing software updates on your smartphone have become second nature. We do them without even thinking about them. When Apple or Samsung or any other company sends out a software update, how do you know that update is real? Hackers are counting on this type of breach...
by admin | Feb 2, 2018 | blog
We are only a couple of weeks away from a brand new year. While this is usually the time many of us start writing down our new year’s resolutions, this is also the time to see which cyber-security trends we need to be aware of in 2018. As cyber-attacks continue to...
by admin | Feb 2, 2018 | blog
Social media isn’t just for promoting your brand, selecting the coolest hashtags, or getting into political arguments that go nowhere. Social media is also a cyber risk for your company. Social media has turned into a playground for cyber-criminals. At least one in...
by admin | Feb 2, 2018 | blog
Cyber security is no longer a luxury item for small businesses. Phishing, ransomware, data breaches, lions and tigers and bears, oh my! It shouldn’t come as a shock anymore that hackers are attacking business websites in various ways, all in order to create...
by admin | Feb 2, 2018 | blog
Looking out for phishing scams is now a day-to-day experience for anyone who uses the internet. How cyber-criminals are finding ways to trick consumers into divulging sensitive information (e.g. bank or credit card account numbers or passwords) isn’t much of a...