A Virtual Private Network, or VPN, is used to connect a private network, such as a company’s internal network, using public wires. In other words you can use an other IP other than your own to appear you ...
The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Techn...
Crypto Ransomware disguised within ads on big time sites Ads featured on sites such as The New York Times, the BBC, MSN and AOL have exposed thousands of users to crypto ransomware. Angler, a toolkit that sells...
Two-factor Authentication is a type of multi-factor authentication that provides identification of users using a combination of two different components. These components are often something the user knows, pos...
The market for a device that can easily replace the standard PC has taken a new approach to size. Don’t be fooled, you may be surprised when you find out what is hiding inside these small machines. Zotac ...
The Microsoft OneDrive, otherwise known as “device cloud”, is available free of charge for anyone who has created a Microsoft account. Included are 5 GB of free storage, easy access to media files, folder synci...
Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...
It was just a couple of weeks ago that BVA wrote about Twitter being the latest victim of a sophisticated hacking scheme. This last week proved to be testing for some of the biggest names out there, Facebook an...
As many of you have probably heard, there are forces of power collaborating over two pieces of legislation, that if passed, could threaten the Internet and all of the vast freedoms we take advantage of. As we a...