• BYOD Policy: Security Implementation Guide

    When I was a child, I wanted nothing more than the tablet device that Penny, the character in Inspector Gadget had. You could read on it, use it as a computer, the functionality was limitless. Fast…

  • 5 Tips for Safe Summer Travels

    When you’re on vacation with the family this summer, your kids are bringing along all of their friends. Not literally, of course, but more than likely they’ll be using their smartphones to stay in…

  • THE ART OF LOSING (YOUR DATA)

    Netflix. Target. LinkedIn. MySpace. Company brands that we are all familiar with. And they all have one thing in common: data loss due to breaches in the company’s security. Some attacks were a result…

  • Image of a hole in a brick wall

    5 ways to protect your systems from exploits

    With the rising tides of ransomware eating up much of the newsfeeds, we are also being reintroduced to an accompanying friend of malware: exploits. While they are different, the two can seemingly go…

  • Security audits: what is your game plan?

    There’s a lot of confusion about how to perform a security audit and what it entails. Some people think that in order to have a secure infrastructure, all you need to do is install antivirus software…

  • The 5 things you need to do to protect yourself from ransomware

    Family photos and videos. Tax returns and other financial records. Business documents. Think about everything that you keep on your computer. What would happen if it all was stolen from you?