
When it comes to a breach of your data, often the password that one of your employees has chosen for their login is the only thing standing between your network and a hacker. [Read more…]

When it comes to a breach of your data, often the password that one of your employees has chosen for their login is the only thing standing between your network and a hacker. [Read more…]

One of those mysterious and scary places you hear about from time to time is the “Dark Web.” This is like the internet underground that can’t be accessed by standard web browsers and where it’s easier for cybercriminals to conduct illegal activities such as selling stolen credit card details or social security numbers. [Read more…]

Voice over Internet Protocol, aka VoIP, has taken the business world by storm in the last several years in large part due to the cost savings. It’s estimated that currently 36% of businesses have made the switch from landlines to VoIP. [Read more…]

Technology seems to move at the speed of light these days with new tools and gadgets coming out every year. But how do you know which of those tools are more than just a fun shiny object and will actually help you improve efficiency and productivity at your office? [Read more…]

One of the standards that is often misunderstood is the Payment Card Industry’s Data Security Standard (PCI DSS). It encompasses the data protection protocols put into place by the major credit card issuers. [Read more…]

The first use of data transmission over the internet for voice communication started in 1973 due to experiments with network voice protocols during government project ARPANET, the seed that later bloomed into the internet as we know it. [Read more…]

Just as technology keeps evolving so do the threats to data and network security. While there are several “old standards” that always need to be guarded against (phishing, malware), there are also new emerging threats being developed every year. [Read more…]

Remember when your mobile phone couldn’t do much more than make a phone call? Now it’s a camera, web browser, and mini-computer. Technology has a way of expanding the features of a device beyond what we expected. [Read more…]

Most of us wouldn’t give out our car keys to random strangers but using insecure passwords can be just as bad. It’s not uncommon for people to use the same password for several logins and make it easy to remember so they don’t get locked out. [Read more…]