New Techniques Used to Target Business Email
Email used for banking fraud The Wall Street Journal is reporting that security firm, Secure Works, has figured out how cyber criminals break into email…
Email used for banking fraud The Wall Street Journal is reporting that security firm, Secure Works, has figured out how cyber criminals break into email…
Are we really doomed? In a recent article in the theguardian about internet cybersecurity, “The state of cybersecurity: we’re all screwed” it stated that “the internet…
I’ve owned and operated a CPA firm for over 25 years and a few years ago I realized I had a serious problem: With increasingly…
How can you protect your data against the attack and exposure? We have one word for you: Encryption! You might not always be able to…
In a related case in New York NBC news is reporting that U.S. Magistrate Judge James Orenstein said the FBI could not compel Apple to…
Apple vs. FBI. Backdoor encryption battle rages on. Justice Department says “Apple marketing strategy” Updated 2/24/16: An encryption backdoor until recently was pretty much geek…
How my grandmother knew portals were bad. Your grandmother may have known more about computer security than you might think; I know mine did ……
Before we knew more than the barest details about the horrific attacks in Paris last week, both former CIA Deputy Director, Michael Morell, and the…
Are you sing a strong password? Encryption by definition is a process of encoding information to prevent unauthorized persons from accessing it. But protecting information…
It’s fair to say that most small businesses typically use Microsoft Office for word processing, spreadsheets and presentations. It’s also fair to say that most…