People make mistakes and it seems we do not learn our lessons. The stakes are high when securing data. Once you’ve “let the genie out of the bottle,” and experienced a data breach, there’s no undoing it. Once this has … Read More
A recent study of 330 global IT professionals, sponsored by Sophos, found that 77% of IT professionals received regular reports of phishing attacks from the end-users they support. While anyone in the office may be the target, the study … Read More
On February 6, 2018, Elon Musk made history as he launched his Tesla roadster into orbit around Mars. The words “DON’T PANIC!” were prominently displayed on the dashboard (a reference to The Hitchhiker’s Guide to the Galaxy).
Many people depend on your ability to maintain your IT security. Your staff depend on it for the sake of their job security. Your clients depend on it for their personal protection and the successful completion of your mutual ventures. … Read More
Downloading an application on an Android device is fairly simple: access the Google Play find the app you want to download and press the button that says install. The next step of reviewing any requested permsssions is very important. While
Email scams have become a sort of punchline, often featuring Nigerian princes or wealthy, unknown relatives in need of funds to get home. However, another email scam is anything but amusing, as it uses a unique possession of the target … Read More