encryption

Chromebooks versus Windows laptops, Which should you buy?

A notebook PC powered by Microsoft Windows offers several advantages: Windows offers the most flexibility to run just about any app, as well as the choice of any browser you choose. You can tweak and configure ...

The Best VPN Services of 2018

“A virtual private network is the best way to stay anonymous online and to secure your web traffic. We’ve tested more than 50 VPNs, and these are our top performers” stated PC Mag’s, Max...

Teenage hacker grabs massive data from 800,000 open FTP servers

Not all teenagers are sneaking out in the middle of the night, one is sneaking into nearly 800,000 open FTP servers. The story begins with a security researcher, Minxomat, scanning IPv4 addresses to find nearly...

Protect your HR department against Cyber Attack

Human Resources is often the target of malicious attacks via hackers and fraudulent email, simply because of the wealth of information available in your HR department. Employee names, birth dates, Social Securi...

Why You Need to Deploy Encryption and How

Encryption is the transformation of data from plain text to ciphertext. In other words, basically taking data that is easy to read and placing it into a riddle that has no rhyme or pattern so that only those th...

How to scrub data from your device

You may be surprised to hear that “Delete” is not an end all function for wiping data clean from your machine. To ensure you data doesn’t get into the wrong hands, perform a secure erase. Whet...

5 Ways to Spy a Hacker in Your Network

1. Search for the telltale signs of a breach.  Port Scans? Excessive failed log-ins? When a hacker infiltrates an unfamiliar network they need to learn the topology of the network, looking for vulnerable points...

Threats That Are Spoofing Mobile Enterprise Apps

Malware has taken to mobile applications, namely those in the enterprise. Enterprise employees use mobile applications to share data, send packages, manage email, and otherwise juggle the needs of a functioning...

Businesses Beware- FBI warns Ransomware is on the rise

The FBI released statements of warning this week about the rapid growth of ransomware attacks. As attacks become more frequent and sophisticated, it is crucial that businesses are proactive about ransomware pre...

What to do if you suspect Malware? We have the answers

Most often one does not know that they are infected with Malware until it is indefinitely too late. A few signs can lead you too believe you might be infected, such as incredibly slow PC performance, browser po...