iPhone “i” Problem Solution

Posted by - November 09, 2017

If you have an iPhone and you’re having the issue where “i” gets replaced with weird characters, here is the fix: Go to Settings Go to General Go to Keyboard Go to Text Replacement Tap + in the top right corner Type lower case i on the phrase line & capital I on the shortcut… Read more »

What is the KRACK Attack and Are You Safe?

Posted by - October 18, 2017

Most of us have been using wireless networks (Wi-fi) daily for years, but you may not know that every one of your wireless devices is currently at risk of being hijacked. Wireless networks previously used a protocol known as WEP, which was insecure, resulting in the creation of WPA2. WPA2 was supposed to protect networks… Read more »

Why you Should Consider VoIP

Posted by - October 06, 2017

Voice over Internet Protocol, more often referred to as VoIP or Voice over IP is a technology that utilizes your internet connection to make and receive phone calls. VoIP is a popular technology option among small to medium sized business to replace their traditional phone system or landlines since it provides more features and cost… Read more »

Want to improve cybersecurity? Try phishing your own employees

Posted by - September 28, 2017

Spear phishing campaigns make up 90% of cyberattacks and most employees are still unable to discern these scams from innocent emails. If you want to improve your company’s cybersecurity education, you might want to consider phishing your own staff. Before making the campaign public, companies should take a baseline measurement of how employees react to… Read more »

5 Awesome Windows® Features You Never Knew Existed

Posted by - September 27, 2017

1. Window Shake and Shrink If you’ve ever worked within multiple Microsoft® windows, you know that bouncing back and forth between them can be a pain. To fix this, click on and hold the title bar of a program and give it a little shake with your mouse. All other windows will minimize, and the… Read more »

Cybersecurity: Too Important to Put on the Back Burner

Posted by - September 12, 2017

While the linked article focuses on the need for security teams to think like criminals, leverage Artificial Intelligence technology, and understand that machine learning will lead to more jobs, the important part for you is to know that you need to invest well in cybersecurity to keep yourself and your business safe, whereas a cybercriminal… Read more »

Phishing in Fish Tanks

Posted by - July 24, 2017

Recently, an internet-connected fish tank at a casino was hacked in an attempt to steal data. This fish tank was web-accessible in order to help automatically feed the fish and keep manage their environment. Once the hacker found the weakness in the tank’s network, they used that to find other vulnerabilities in the casino’s network…. Read more »

A Court Verdict Raises the Pressure for Website Accessibility

Posted by - July 24, 2017

Do you know if your website is currently in compliance with the Americans with Disabilities Act? Do you work for an organization where it is required for your website to be accessible to people with disabilities? If you’re unsure of either of these questions, you may want to talk to an expert before it’s too… Read more »

Adobe Flash Player users should update their software NOW

Posted by - July 17, 2017

Adobe Flash Player is a favorite piece of software for hackers to exploit for various reasons: it’s on a lot of computers, users need it to access Flash-based content, and many users do not keep it updated. Because of these and so many others, hackers love coming up with new ways to invade your devices… Read more »

Major Cryptocurrency Exchange Hacked – Customer’s Accounts Plundered

Posted by - July 14, 2017

Bithumb, which is one of the world’s largest cryptocurrency exchanges, was recently hacked, with the criminals making off with approximately 32,000 customers’ user account information. Thankfully, no passwords were obtained. This hack was different in that instead of going after the exchange’s internal network, the hackers broke into a home PC of an employee of… Read more »