Fileless malware: who are the targets?

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” ...

Healthcare software: a healthy development

No healthcare provider today can operate without robust technology backing them. That doesn’t mean they have to spend excessively ...

Real-world audits: disaster recovery plans

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s ...

Russian hackers target Mac OS X users

Fancy Bear, also known as APT28, is the Russian cybercriminal group responsible for hacking the Democratic National Party last ...

Social media platforms that suit your SMB

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, ...