Most phishing email goes after mass targets. It’s not particularly well-crafted, but the senders expect that if they hit enough mailboxes, some victims will open the attachment or visit the malicious website. A growing portion, though, targets specific companies or individuals with carefully crafted messages. It’s called spearphishing. When it’s aimed at high-profile individuals or large assets, it’s also called whaling — going after really big fish. (All right, a whale isn’t really a fish.) Continue Reading
Welcome back to the second half of our two-part series on when and why your business should be using encryption. If you joined us last time, you’ve probably started to realize just how useful encryption is and that it can be applied to anything you’d like to keep safe from hackers, whether or not they make it past your firewall. In the first half, we covered encrypting client payment data at every stage and began to talk about the risk of identity theft if hackers get ahold of either client or employee personal information. Let’s pick back up where we left off at storing personal information once you’ve collected it. Continue Reading
Every modern company with a few computers and a business network are aware of the dangers of hackers and security breaches. When a hacker gets their grubby fingers on private information stored by your company, they can do a lot of damage. Customer information can be used for payment scams or identity theft while sensitive business information can be used against you on the market or leaked to your competitors to great detriment. Every business strives to keep their security systems as close to the cutting-edge and maximum protection as possible but, let’s face it, every now and then someone gets hacked. Whether it was a failure on their part or a particular moment of inspiration from the hacker, when your network has been breached, you absolutely must have a backup plan. Continue Reading
The massive data breach at Facebook has been a hot topic in the news lately, and you may be wondering if your data was affected and if your personal information is secure online. The data breach, which happened when the political research firm Cambridge Analytica obtained the data of 87 million users, affected people around the globe. If your privacy and security is important to you, read on to learn more about how you can tell if your data was compromised, and what you can do to prevent future risks. Continue Reading
If you have trouble with Google’s Chrome browser crashing when you are using it, you are not alone. Windows users have been complaining of this issue for a while and Google’s tech team has decided how to handle the problem. In most cases, Windows users have other programs running while running Chrome, such as antivirus and accessibility software. Unfortunately, these programs inject code into your Chrome web browser, causing it to crash. Google states that Windows Chrome users have 15 percent more crashes than other users. Continue Reading
We’ve all been to the pediatrician’s office and heard the question, “How many hours of screen time does your child get?” We’ve heard the research, so some of us may lie and subtract an hour (or two) from the real answer. As parents, we’ve been told that too much screen time is bad for our children. Experts say it can lead to diminished personal relationships, obesity, and can even affect your child’s brain. So we feel guilty if we turn on the television to get a few extra minutes to finish cooking dinner or hand our screaming three year old the phone so he will stop crying. But is there really a basis for the claims that screen time harms our children? Continue Reading
There are a lot of different kinds of malware out there and most of it is relatively harmless. There are the adware types that cause a bunch of unwanted advertisements to pop up on your screen infection occurs, botnets that use some of your resources to send spam emails or contribute to DDOS-ing a targeted website, and the ‘fake tech support’ that, hilariously enough, informs you that your computer has been infected with malware. However, it’s been a long time since malware was a laughing matter. Over time, hackers realized they could make money by stealing credit card numbers banking login information and it occurred to some bright cyber-criminal that they could simply and openly extort their victims. Thus the birth of ransomware. Continue Reading
Apple released iOS 11, its newest version of the mobile operating system powering iPhones and iPads last month. And as is the case every time such a major update happens, countless Apple device users users are facing a decision on whether or not to download it, not knowing what to expect.
The newest iteration has some potentially major changes in stock, depending on how you use your mobile device. So whether you’re already completed the update or are still considering it, here are 10 features that are new to iOS 11 for your consideration. Continue Reading
When a company decides to outsource their IT services, there are always a few decisions to make. Whether or not to hire someone local or a larger fully-remote service, how much service your company needs, and how much interaction you’d like with your external IT team. Some companies with very few computers or need for innovation may find that basic emergency break-fix services are sufficient but in the modern age when most companies have a website, app, and software suite, it’s best to go for complete managed IT. How is this different from a break-fix package? Managed IT services take pride in their ability to provide technical support above and beyond the basics, working with companies rather than simply working for them when something goes wrong. Here are the five primary reasons why a high quality managed IT service offers much more than break-fix solutions. Continue Reading
Going back to school makes us think of new backpacks and freshly sharpened pencils, but children today might have another item on their shopping list: a new mobile device.
Even if they make do with the old one, you know they’re still putting it to use: as of 2015, teenagers were spending about nine hours a day using digital technology, while kids ages eight to 12 were spending about six hours. Those hours are spent watching videos, listening to music, and engaging with peers via apps like Snapchat and Instagram.
All that time online exposes children to a variety of risks. We’ve been talking about online predators for years, but there are some other concerns you may not have considered. Continue Reading