Chrome: From HTTP to HTTPS

Google Chrome currently marks HTTPS-encrypted sites with a green lock icon and “Secure” sign. And starting in July, Chrome will mark all HTTP sites as “not secure.” Google hopes this move will nudge users away from the unencrypted web. Read on to learn more about the forthcoming changes. For several years, Google has moved toward […]

Five steps to ensure VoIP service continuity

Voice over IP (VoIP) phone systems offer far superior mobility, functionality, and cost-efficiency than traditional landlines. But like any computer system, it can be vulnerable to service disruptions, equipment failure, and cyberattacks. With proper preparation, however, your phone systems can weather any disaster. Invest in VoIP monitoring services Before implementing any disaster recovery solutions, it’s […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +