IoT Devices Are Not Safe By Default!

You may have never heard them referred to as “Internet of Things” devices, but you might just have a few in your home. Smart home gadgets, Alexa and Google Home, and smart screens in newer car models are all examples of these sophisticated yet highly functional...

Warning: Emotet Malware is Back in Action

Emotet, a well known banking trojan used to steal sensitive information (like bank account details) from computers, has awakened after a four month long hibernation. And with a reputation for being one of the most damaging, elusive and costly malwares around,...

We Know You Have Trust Issues, But Windows Updates are Safe Now

Microsoft Windows updates don’t have much of a favorable reputation. Folks always seem to be groaning about their frequency, inconvenience, and functionality! It's even become a bit of a running joke for those who use computers on a frequent basis. But as we’ve...

A Bit of Irony for Bitcoin Enthusiasts

Email receipts, paperless banking, electronic filing: these computer-powered features have been notoriously helpful when it comes to conserving energy and natural resources. As a matter of fact, with apps like PayPal and Venmo, even cash is becoming somewhat...

An Unexpected Way To Keep Technology Secure: Update, Update, Update

Annoyed by those constant system updates that seem to happen at the most inconvenient of times? Don’t be. They might feel arbitrary or even pointless, but behind the scenes those updates are actively protecting you against dangerous vulnerabilities in your existing system.

You’ve Got Ransomware- Now What?

If some of your data suddenly appears to be held hostage until you pay a fee, it’s likely that you’ve found yourself a victim of ransomware. This can be a frightening experience that seems to warrant an extreme reaction, but don’t buy into it just yet- there are...

To Encrypt or Not to Encrypt- That is the Question

You’ve likely heard of “encryption” in reference to sensitive information- like when a payment is being processed online. What is it, then? And how does it work? To encrypt data means to scramble it, thereby preventing unauthorized access. And it’s absolutely...

A Foolproof Guide to Backing Up Data

“Save early, save often” was the phrase drilled into us when we first started using computers- and even though most things save automatically these days, the same concept still applies to backing up crucial data. Don’t let the “it’ll never happen to me” mindset...

Who’s The Bigger Threat: Hackers, or Your Own Employees?

You may be surprised at the answer. Don’t worry- your staff isn't out to get you, or your data. However, they are human, and have a propensity for making mistakes. That’s exactly why they were ranked as the highest risk to data security in the 2019 Global...

Is VOIP System Right For Your Business?

Studies show traditional landlines may be going the way of the dodo as VoIP systems grow exponentially in popularity. As a matter of fact, over 200 billion corporate users are predicted to be using internet-based telephone services by 2020. So what is VoIP, and how...