Malware. The mere mention strikes fear in the heart of every business owner on the planet – and for good reason seeing that these malicious attacks, in the form of trojans, viruses and worms are pure and simply trouble with a capital T! So, what exactly is malware? In short, it’s malicious code created by…Read More. . .
There’s a sentiment among many small business owners that they’re not large enough to attract the attention of cyber criminals. But just because you’re a small fish in a big pond doesn’t mean you’re invulnerable to so-called phishing attacks. Remember – if you’re on the Internet, it’s open game for hacker hunters. In fact, it…Read More. . .
We’re not typically much for hyperbole, but we have to say that the new Epson ink technology is definitely cutting-edge and could be a real game-changer in the print management industry. What makes this technology different is that it doesn’t require heat to print, and this results in vastly superior color, longer life span for…Read More. . .
In a previous article, we addressed the importance of strong passwords and listed the most common ones used in recent years. Now, let’s talk a little about the “psychology of passwords” and find out what’s behind the choices we make. We’re all aware that a password with strength should include upper and lower case letters,…Read More. . .
Amazing, this day and age of technology we live in! Just a mere couple decades ago, who would have thought we could control the temperature in our homes from long distance, never mind store pretty much all our information on a cell phone. And since technology never rests on it laurels, now there’s a “new…Read More. . .
The so-called “paperless society” that seemed nothing more than fantasy a mere decade or so ago has become reality for many businesses, thanks to software and technology. But a lot of companies and organizations still spend far more on paper and energy to create documents than they need to; in fact, an estimated 1% to…Read More. . .
While it is impossible to protect confidential information 100% of the time, regular risk assessments and real-time monitoring can go a long way toward ensuring your business does not suffer from breaches via the dark web – a segment of the Internet that isn’t indexed by search engines and that is the bane of existence…Read More. . .
Last time around we talked about the Internet’s “dark web,” which in short cannot be accessed on a standard web browser but instead requires a special network to keep all activity completely untraceable and anonymous. Sounds pretty nefarious? That’s because it can be and although research conducted via the dark web by journalists, law enforcement…Read More. . .
The Internet – what would we do without it? From work-related research, to online shopping and a whole lot in between, “logging on” is a daily routine for most of us…and for a lot of us, online activity is productive and innocent. For the criminally intent, use of the Internet is also productive, but definitely…Read More. . .
Working from home is increasingly commonplace as many companies in response to COVID-19 restrictions have had large numbers of their employees working remotely. Regarding a home office: it’s important to have the proper protocols set up for IT and Managed Network; that’s a topic that we will address in greater detail in other blogs. As…Read More. . .