Why You Should Get a Regular Audit of Your IT Security
Jul16

Why You Should Get a Regular Audit of Your IT Security

Welcome to the Age of Technology, in which everything seems to be connected through the Internet and internal networks. If you are running a business, you most likely have a network that you and your employees use for operational tasks.

Your network might seem secure to you, but how are you really going to know without getting it checked out[...]

Read more.
Frequently Asked Questions About Ransomware
Dec06

Frequently Asked Questions About Ransomware

Ransomware is malicious software (malware) designed to extort money from users. There is a lot of information being shared about all the different types of ransomware. With all the data available, it's hard to get a full understanding of this serious threat. That's why we put together these FAQ's. It's our hope that it  will help you to[...] Read more.
Here’s what you should know about the KRACK WiFi vulnerability
Oct17

Here’s what you should know about the KRACK WiFi vulnerability

1. It does not affect Access Points, unless the Access Point is in client mode (Wireless Bridge).
2. It does not affect Windows or iOS, as they don’t support the part of the handshake that allows for the rekeying vulnerability.
3. BSD/Linux/Android (it runs the Linux kernel) are affected since a majority of the AP’s on the market use[...]

Read more.
Why Forcing Frequent Password Changes is Actually Harmful for Security
Sep06

Why Forcing Frequent Password Changes is Actually Harmful for Security

The general rule of thumb in security is to have users reset their passwords every 60 or 90 days. If you're a user who logs into a network every day, you're probably familiar with the notification that you must change your password. If you're an IT administrator, you are probably faced with determining the right time interval to satisfy security[...] Read more.
Common Intrusion Points for Ransomware and Malware Infections
Aug09

Common Intrusion Points for Ransomware and Malware Infections

If you have read the news recently, you have  probably heard of the WannaCry ransomware attack, a scary computer infection that took hold and quickly spread worldwide. In what seemed like a matter of hours, computers across the globe were crippled, as were the businesses that owned them.

As ransomware goes, the WannaCry exploit turned out to[...]

Read more.