Factsheet on Mobile Applications and Cybersecurity

FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of thes

keep reading

Google Docs Being Used to Attack Users With TrickBot Banking Trojan

Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the

keep reading

Here’s What You Need to Know to Be Successful at Digital Transformation

Here's What You Need to Know to Be Successful at Digital Transformation Are you taking a scary road into an uncertain future -- also known as digital

keep reading

Happy Labor Day

To make the most out of what we hope will be a gorgeous long weekend, we will be closing our office for the day on Monday, September 2nd. And as alwa

keep reading

10 Questions Every Company Should Ask Before Outsourcing IT Services

Ten questions to ask while considering outsourcing your IT services to a provider.   Many companies are outsourcing their IT functions due to conveni

keep reading

Why is Effective Business Continuity Management Important?

Why is Effective Business Continuity Management Important? Business continuity management (BCM) denotes how organizations plan for and respond to risk

keep reading

Newly Discovered Security Flaws Put Windows Users at Serious Risk

Microsoft Vulnerability Affects Most Recent Operating Systems Learn about two recently discovered vulnerabilities that could put your company’s comp

keep reading

Capital One Data Breach

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers a

keep reading

20+ Government Entities in Texas Breached By Ransomware Attack

More Than 20 Government Entities in Texas Breached By Statewide Ransomware Attack Texas state officials reported on Friday, August 16th, that at leas

keep reading

Cyber Security is Vital for Small Businesses

Small Business Tech Security Small businesses need to take cyber security seriously, preventing lapses or weak points that could lead to major data br

keep reading