WordPress Updates are No Longer Automatic

Posted by - February 08, 2018

Making sure your website is updated with the latest patches is very important as new vulnerabilities are discovered almost daily – so what happens when the latest update stops your updates from working? On Monday, WordPress released version 4.9.3. The very next day, WordPress released version 4.9.4. Although version 4.9.3 fixed 34 bugs, it also… Read more »

The Holiday Season Is Scammer Heaven

Posted by - November 16, 2017

It’s the Holiday Season once again, but remember it is also a holiday for the bad guys as well, but not in the way you might think. Hackers go into scam-overdrive mode during this time of the year to prey on the heavy shopping done by consumers. This time of year is the busiest for… Read more »

What is the KRACK Attack and Are You Safe?

Posted by - October 18, 2017

The Hidden Threat to Wireless Networks Most of us use wireless networks (Wi-Fi) daily, but many don’t realize that every wireless device is at risk of being hijacked. Wireless networks initially relied on a protocol called WEP, which proved insecure. This led to the development of WPA2. While WPA2 was designed to protect networks and… Read more »

Why you Should Consider VoIP

Posted by - October 06, 2017

Voice over Internet Protocol, more often referred to as VoIP or Voice over IP is a technology that utilizes your internet connection to make and receive phone calls. VoIP is a popular technology option among small to medium sized business to replace their traditional phone system or landlines since it provides more features and cost… Read more »

Want to improve cybersecurity? Try phishing your own employees

Posted by - September 28, 2017

Spear phishing campaigns make up 90% of cyberattacks and most employees are still unable to discern these scams from innocent emails. If you want to improve your company’s cybersecurity education, you might want to consider phishing your own staff. Before making the campaign public, companies should take a baseline measurement of how employees react to… Read more »

5 Awesome Windows® Features You Never Knew Existed

Posted by - September 27, 2017

5 Features You Never Knew Existed 1. Window Shake and Shrink If you’ve ever worked within multiple Microsoft® windows, you know that bouncing back and forth between them can be a pain. To fix this, click on and hold the title bar of a program and give it a little shake with your mouse. All… Read more »

Cybersecurity: Too Important to Put on the Back Burner

Posted by - September 12, 2017

While the linked article focuses on the need for security teams to think like criminals, leverage Artificial Intelligence technology, and understand that machine learning will lead to more jobs, the important part for you is to know that you need to invest well in cybersecurity to keep yourself and your business safe, whereas a cybercriminal… Read more »

Phishing in Fish Tanks

Posted by - July 24, 2017

Recently, an internet-connected fish tank at a casino was hacked in an attempt to steal data. This fish tank was web-accessible in order to help automatically feed the fish and keep manage their environment. Once the hacker found the weakness in the tank’s network, they used that to find other vulnerabilities in the casino’s network…. Read more »

A Court Verdict Raises the Pressure for Website Accessibility

Posted by - July 24, 2017

Do you know if your website is currently in compliance with the Americans with Disabilities Act? Do you work for an organization where it is required for your website to be accessible to people with disabilities? If you’re unsure of either of these questions, you may want to talk to an expert before it’s too… Read more »

Adobe Flash Player users should update their software NOW

Posted by - July 17, 2017

Adobe Flash Player is a favorite piece of software for hackers to exploit for various reasons: it’s on a lot of computers, users need it to access Flash-based content, and many users do not keep it updated. Because of these and so many others, hackers love coming up with new ways to invade your devices… Read more »