Internet

VPN, you need one

A Virtual Private Network, or VPN, is used to connect a private network, such as a company’s internal network, using public wires. In other words you can use an other IP other than your own to appear you ...

Who’s in Charge of Your Cybersecurity?

  The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Techn...

New on our radar…ads spreading crypto ransomware

Crypto Ransomware disguised within ads on big time sites Ads featured on sites such as The New York Times, the BBC, MSN and AOL have exposed thousands of users to crypto ransomware. Angler, a toolkit that sells...

Two-Factor Authentication Evaluation Guide

Two-factor Authentication is a type of multi-factor authentication that provides identification of users using a combination of two different components. These components are often something the user knows, pos...

Three Unbelievably Tiny Computers

The market for a device that can easily replace the standard PC has taken a new approach to size. Don’t be fooled, you may be surprised when you find out what is hiding inside these small machines. Zotac ...

Microsoft OneDrive raises the bar for cloud storage

The Microsoft OneDrive, otherwise known as “device cloud”, is available free of charge for anyone who has created a Microsoft account. Included are 5 GB of free storage, easy access to media files, folder synci...

Cyber Security Threats – Proactive Rather Than Reactive

Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...

First Twitter, now Facebook & Apple

It was just a couple of weeks ago that BVA wrote about Twitter being the latest victim of a sophisticated hacking scheme. This last week proved to be testing for some of the biggest names out there, Facebook an...

The Internet Blackout of 2012

As many of you have probably heard, there are forces of power collaborating over two pieces of legislation, that if passed, could threaten the Internet and all of the vast freedoms we take advantage of. As we a...