The Holiday Season Is Scammer Heaven

Posted by - November 16, 2017

  It’s the Holiday Season once again, but remember it is also a holiday for the bad guys as well, but not in the way you might think. Hackers go into scam-overdrive mode during this time of the year to prey on the heavy shopping done by consumers. This time of year is the busiest… Read more »

iPhone “i” Problem Solution

Posted by - November 09, 2017

If you have an iPhone and you’re having the issue where “i” gets replaced with weird characters, here is the fix: Go to Settings Go to General Go to Keyboard Go to Text Replacement Tap + in the top right corner Type lower case i on the phrase line & capital I on the shortcut… Read more »

What is the KRACK Attack and Are You Safe?

Posted by - October 18, 2017

Most of us have been using wireless networks (Wi-fi) daily for years, but you may not know that every one of your wireless devices is currently at risk of being hijacked. Wireless networks previously used a protocol known as WEP, which was insecure, resulting in the creation of WPA2. WPA2 was supposed to protect networks… Read more »

Why you Should Consider VoIP

Posted by - October 06, 2017

Voice over Internet Protocol, more often referred to as VoIP or Voice over IP is a technology that utilizes your internet connection to make and receive phone calls. VoIP is a popular technology option among small to medium sized business to replace their traditional phone system or landlines since it provides more features and cost… Read more »

Want to improve cybersecurity? Try phishing your own employees

Posted by - September 28, 2017

Spear phishing campaigns make up 90% of cyberattacks and most employees are still unable to discern these scams from innocent emails. If you want to improve your company’s cybersecurity education, you might want to consider phishing your own staff. Before making the campaign public, companies should take a baseline measurement of how employees react to… Read more »

5 Awesome Windows® Features You Never Knew Existed

Posted by - September 27, 2017

1. Window Shake and Shrink If you’ve ever worked within multiple Microsoft® windows, you know that bouncing back and forth between them can be a pain. To fix this, click on and hold the title bar of a program and give it a little shake with your mouse. All other windows will minimize, and the… Read more »

Cybersecurity: Too Important to Put on the Back Burner

Posted by - September 12, 2017

While the linked article focuses on the need for security teams to think like criminals, leverage Artificial Intelligence technology, and understand that machine learning will lead to more jobs, the important part for you is to know that you need to invest well in cybersecurity to keep yourself and your business safe, whereas a cybercriminal… Read more »

Phishing in Fish Tanks

Posted by - July 24, 2017

Recently, an internet-connected fish tank at a casino was hacked in an attempt to steal data. This fish tank was web-accessible in order to help automatically feed the fish and keep manage their environment. Once the hacker found the weakness in the tank’s network, they used that to find other vulnerabilities in the casino’s network…. Read more »