Our Blog

Global Ransomware Epidemic: Know the email tactics used by cyber criminals

With yet another high-profile breach in security in our recent past (Equifax), you now have to assume that your personally identifiable information (PII) has already been compromised. Whether you are a consumer, business owner or an employee, you need to continue practicing a heightened level of skepticism.   As it relates to an email that you receive, there are 3 potential areas for you to take notice:  The email header-  Did the email come … Continued

5 Ways to Avoid Phishing Attacks

In a world where new cyber threats and techniques seem to develop almost weekly, some phishing tactics that have stood the test of time and continue to jeopardize corporate security. The email below came to me from a bogus address masked as coming from one of our owners. This is a common tactic – sending … Continued

What Should I Pack When I Move to the Cloud?

Just like moving to a new office, making a move to the cloud provides companies the opportunity to clean out and get rid of some old items they won’t use anymore. However, because cloud computing encompasses applications, security and processing, the clean-up can seem daunting. Here is a quick guide on what to keep and … Continued

A Beginner’s Guide to Encryption

Have you had concerns about becoming a victim of hacking? Implementing additional data security layers – such as encryption – can seem daunting and unobtainable for those who don’t fully understand it. To help you better understand, here is our beginner’s guide to encryption.   What is Encryption? Encryption is a way to prevent unauthorized … Continued

Two-Factor Authentication as Additional Security

What is two-factor authentication? To understand two-factor authentication, you will need to know what single-factor authentication is.  Single-factor authentication is a common login where you have to enter your username and one password.  In this single-factor authentication model, anyone who can obtain your username and password, can get access to your account.   Two-factor authentication, … Continued

How Often Should I Replace My Servers?

Servers are such a vital part of a company’s technology infrastructure. Depending on how you use your server, your day-to-day operations could come to a halt if you experience issues like server downtime. By not being able to complete your day-to-day tasks, you’re sure to lose money. So, you ask, “How often should I replace … Continued

What is Li-Fi?

*Image sourced from TechWorld.com   New industry buzzwords are hard to keep up with – especially in the technology industry.  New updates, models, releases, and more are now coming standard with new names and acronyms.  Light Fidelity, or Li-Fi, is an industry buzzword we think is worth talking about.   The term Li-Fi was coined during … Continued

How Blockchain Works

Although still in its experimental phase with most corporations, blockchain has become a widely discussed topic.  Before we begin to discuss blockchain, we feel it is necessary to first discuss and understand how a ledger works.   Most checkbooks come with a paper ledger to track money in and out of an account and display … Continued

Will That Be Cash or Near Field Communication Today?

In the early 1980s, four of New York City’s largest major banks attempted to launch a new, innovative method of banking that would provide remote services to their customers.  These remote services would give customers the ability to access and utilize the banks’ financial resources without leaving the comfort of their own homes. This new … Continued

Which Type of Technology Consumer Are You?

Before making purchases, the typical consumer goes through a 3 step process: Product Awareness – the consumer either becomes aware that a product exists in the marketplace or realizes the need for that type of product Product Consideration – the consumer compares the product against other similar products available and weighs the pros and cons. … Continued