Hackers Want to Hack Your Phone
Short on time? Check out our infographic that sums it all up here. Take a second to open a new tab and Google “cell phone hacking”. What do most of…
Short on time? Check out our infographic that sums it all up here. Take a second to open a new tab and Google “cell phone hacking”. What do most of…
Even though Windows 7 was released nearly a decade ago, it’s still incredibly popular with over 35% of PCs running on the aging operating system. However, your days with this…
Hackers target attorneys. According to the National Law Review, “As more and more clients send cyber due-diligence questionnaires to outside counsel to confirm that their sensitive information is secure, law…
Sixty percent of small businesses get hacked each year, but why? One of the main reasons is that small businesses are simply not spending enough on cyber security. With the…
Our lives are intricately intertwined with technology. Whether it’s at a desk or in the field, most of us are daily technology users. We use mobile apps to order food…
Legal speak From detection to notification and response, a data breach will cost you, no matter your industry or company size. In fact, the average cost of a data breach…
The basics Section 13402(e)(4) of the HITECH Act requires that all healthcare breaches impacting 500 or more individuals must be posted by the Secretary. We visited the US Department of Health…
Cyber Monday 2018 was the biggest US shopping day ever, with sales reaching nearly $8 million. And let’s be honest, shopping online during the holidays is convenient. You don’t have…
Phishing basics: Phishing is a fraudulent technique to trick a person into revealing sensitive information such as login credentials, bank account information, trade secrets, or credit card numbers by posing…
Support for Windows 7 will end on January 14, 2020. We all knew this day was coming, but don’t fret. We’re a Microsoft partner and we’re all about silver linings…