ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of ex[...]
Ransomware in the Air – Strategies to Prevent and Protect Unless you’ve been living under a rock, you’ve probably heard about the latest flavor[...]
Microsoft Word is used by over one billion users worldwide, and of those how many are using it to its full potential? Over the years Word has transfor[...]
Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting anothe[...]
While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, howeve[...]
Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can[...]
Your computer has been acting up a lot lately. It keeps crashing, it’s slow and, to top it off, you keep getting pop-ups you don’t want to see. If[...]
Whether or not to monitor your employees' computers can be a tricky decision. While part of you may think it’s unethical, you also may question if y[...]
From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among busine[...]