Twitter alerts users to cyber attacks

Earlier this month, social media platform Twitter alerted a number of its users to the fact that their accounts may have been hacked into by something, or someone, known as a “state-sponsored actor.” While a warning of this kind is certainly not unprecedented – for some time now, both Facebook and Google have also been […]

How Google overcomes secure browsing issues

With the vast majority of end users turning to Google as their search engine or default browser of choice, it comes as no surprise to learn that the company takes security seriously. But in a perpetually changing landscape where anti-virus and anti-malware tools are constantly chasing their tails in order to stay up to date […]

Don’t download that health app just yet

Mobile health applications have been growing in popularity but this doesn’t necessarily mean their effectiveness is improving. In fact, doctors have called for greater oversight and regulation when it comes to health apps as many have never been truly tested. A number of these apps also make false claims about benefits in order to get […]

Scenarios that might require BCP action

A Business Continuity Plan (BCP) is a valuable security blanket for countless companies across the nation. And while business owners hope they never have to invoke their continuity plan, it is important to understand which events might necessitate it coming into action. By understanding how certain disasters can impact your business, you’ll have a better […]

Cortana tips and tricks for an easier life

Wouldn’t it be grand if you could afford to hire your own personal assistant? Someone who could take care of menial tasks, sing songs to you, and generally just make your life more pleasant? As technology develops, we are getting closer and closer to virtual assistants who are just as good as their real-life counterparts. […]

The 7 must-have apps for any Android tablet

Choosing an app for your Android tablet can be daunting. Whether you’re looking for a document reader app or a new web browser, there are many options out there that offer similar features. So how do you know which ones are the best fit for your device? We’ve compiled a list of powerful applications that […]

Virtualization questions to consider

For small or medium-sized business, getting a leg up on the competition can be the difference between simply surviving and thriving. One way of doing this is by embracing virtualization. Many SMBs have used virtualization techniques to great effect, but implementing a change can be difficult and time-consuming. Here are a few questions you should […]

4 facts about HIPAA and your IT

While HIPPA’s implementation in relation to technology has been problematic to say the least, things have become much clearer over the course of the past year. However, there are still a few areas in which your office might not be compliant. This isn’t necessarily through negligence on your part, but rather simply a lack of […]

What’s the difference between FXS and FXO?

Voice over Internet Protocol (VoIP) systems are designed to provide a reliable and cost-effective telecommunication environment for businesses. If you’re looking to deploy a VoIP telephony system for your company, you’ll probably come across the acronyms FXS and FXO from time to time. But what exactly do these phrases mean? Here, we’ll explain the difference […]

Improve your overall cybersecurity posture by empowering your workforce to recognize and prevent social engineering attacks. Our FREE eBook will teach you how to design and implement a cybersecurity awareness training program that works.Learn more here
+ +