Skip to content

Having a solid cybersecurity plan is vital for all businesses, but some elements tend to be forgotten. One of them is DNS filtering, which is the more technical term for internet filtering and can be an important tool for making sure that your network stays safe from malicious websites and content. What is DNS Filtering?…

Read More
man in mask

I want to preface this post by saying that the CoronaVirus is a horrible disease that’s having a devastating impact on not only individuals and families but entire communities, regions, and industries. Our hearts and prayers are with everyone impacted and we hope this problem is resolved quickly. With that said, CEO’s and Business Owners…

Read More

Time is up for Windows 7. Users have to move on, one way or another. As of January 14, 2020, Microsoft won’t offer any more support for the operating system. There will be no updates and no security patches. Continuing to use it on the Internet will be like walking through a malaria-infested swamp with…

Read More

A few months ago, some rather creative hackers came up with a pretty ingenious con.  They realized they could create an email like the one below pretending to have hacked your computer and installed malware that has allowed them to watch you surf the internet and even video what you were doing while surfing the…

Read More
shadowy figure

What comes to your mind when you hear the term ‘Shadow IT?’ For some people, they first think about Ra’s al Ghul’s League of Shadows –formerly referred to as League of Assassins- in the film Batman. This answer is not far from the truth because Shadow IT is an assassin targeting organizations with huge adverse…

Read More
laptop on desk

BYOD or Bring your own device policies are becoming more and more common, especially for contractors and people who work remotely. Many employees don’t want to have to carry two separate cell phones, do work in their own home on their own desktop, or have one laptop for both work and personal purposes. BYOD also…

Read More
User accessing macbook air

Apple Macbooks and iMacs have been long praised for their built-in security features and access restrictions, unfortunately, the software you install on your Macbook, not so much! Yesterday, Jonathan Leitschuh provided a post on Medium, the popular blog aggregation service, about a zero-day vulnerability in Zoom’s Conferencing software the opens your Apple MacOS computer to…

Read More
Scroll To Top