Blog
Using Mobile Hotspots Safely
Connecting to the internet in public incurs additional security risks regardless of the specific computing device you use. You’re in close proximity with people you don’t know, which could include hackers trying to use your
8 Actions Your Business Can Take Now to Avoid Paying a Ransom Later
The number of ransomware attacks have exploded in 2021 — and so, too, have the size of the ransoms. Here are eight actions that companies can take so they do not have to pay a
You Can Now Stop Your iPhone Apps from Tracking Your Activities
Apple has rolled out App Tracking Transparency (ATT) feature in the iOS 14.5 update. Find out how this feature works and why some groups are applauding ATT while others are fighting it. For years, smartphone
A History of Ransomware
Ransomware is a type of malware in which the perpetrator threatens to commit a malicious act unless the victim pays a ransom. The simplest type of ransomware appears to lock the target system, although a
To Pay or Not to Pay: That is the Question That Ransomware Victims Must Answer
Colonial Pipeline Company recently paid $4.4 million dollars to get its data back after a ransomware attack, rekindling the debate of whether companies should give in to cybercriminals’ demands. Find out why some companies decide
3 Things to Keep in Mind Before Moving More IT Operations to the Cloud
With the future looking brighter, companies are contemplating moving more IT operations to public clouds. Here are three things to keep in mind before doing so.