Why Regulate Your Company’s Mobile Devices? The Answers May Surprise You

January 19, 2018
In October 2017 Lookout surveyed approximately 2,000 US IT executives regarding their own and their company’s use of mobile devices in the workplace. The main purpose of this survey was to measure the upcoming GDPR (General Data Protection Regulation) being unrolled in the next six months. The fines for companies that don’t comply with this […]
Read MoreMacOS High Sierra Root Account Compromise Fixed

December 1, 2017
Most computers have an account which by default allows unrestricted access and control to all of the commands and programs on an operating system. This account is called a “root” account by Macintosh and Linux, and “administrator” by Windows. Earlier this week Apple released its next big operating system update: MacOS High Sierra. Software updates […]
Read MoreCyber Security and Protecting Your Clients Part 2 – Starring Equifax.. Again

October 13, 2017
If you live in the United States there’s a good chance that you already know what Equifax is, and if you don’t already know what Equifax is then you’re probably going to get a not-so-great first impression of the business from this article. Equifax is one of three companies required to provide credit reports for […]
Read MoreCyber Security and Protecting your Clients – Starring Equifax

September 8, 2017
Equifax is one of three companies required by the federal government to provide credit reports for citizens of the United States. Recently, Equifax announced that it had been hacked back around May or April of this year. Here’s the problem, if you are a business that interacts with other people or organizations, you are probably […]
Read MoreWindows 10 S – Is the Security Really There?

July 5, 2017
Windows 10 S is a new version of Windows which launched alongside the new Microsoft Surface Laptop. The Surface Laptop itself is a fairly powerful device, but its default operating system – Windows 10 S – limits the laptop to the capabilities of a chromebook. No, this is not a design flaw with Windows […]
Read MoreThree Main Methods of Ransomware Delivery

March 8, 2017
Spring is almost upon us, but before we begin hanging up our winter coats, let us take a look back to the 2017 Presidential Inauguration. A few days before the Presidential Inauguration, which was on January 20th, Washington D.C. had a brief ransomware infection. This infection affected systems which were networked with some of the […]
Read MoreProtecting Your Accounts with Multi-Step Authentication

February 8, 2017
For those of you who do not already know, two factor authentication is a method of adding extra security to a product or service by requiring the user to provide their traditional account information, such as username & password, as well as an additional piece of information which can come in many forms. Two forms […]
Read More3 Tips to Help You Get More out of Your Computer

January 5, 2017
It’s a brand new year, which means that the gyms will be packed for the next three months or so, and many salads will be consumed. However, you should make your New Year’s resolution more than just to improve the management of your physical condition, you should also aim to improve your management of your […]
Read MoreThe Importance of Passwords and Password Management

December 27, 2016
If I had a penny for every time a website told me that my password was too weak, I’d probably have enough for a combo meal from any fast food restaurant. This time it’s my turn to give the password lecture all in the name of cyber security. There are many ways websites go about […]
Read More3 Tips That can Indicate Your Computer Has Malware

September 15, 2016
The sheer amount of people who use the internet makes it a great place for malevolent opportunists, who can tamper with your technology, privacy, and income if you are not careful. Since I have not met anyone who enjoys having their privacy intruded on, technology broken, or income stolen, I am going to give you […]
Read More