Are People Getting Email From You...That You Did Not Send?

Are people telling you they just received a weird email from you, that you don’t recall sending? This is a sure sign of attack! Don’t just assume someone has your email address and there’s nothing…


Artificial Intelligence (AI) is the New Attack Tool Stealing Data

It’s also the latest defense against data loss... Security tools keep changing - meaning you can’t depend on firewalls you installed 5 years ago to defend your company against today’s attacks.…


Protect Your Identity - Freeze Your Credit...

It’s about time - between all the information you give out on a check (including your name, account number, and routing number), and how easy it is to duplicate a credit card or open a new…


Do You Know The Symptoms to Watch For - Letting You Know People Are In Your Computer?

It’s not always easy to know...hackers are getting smarter all the time, so never assume you’re safe - instead, regularly work with professional security engineers to find out. Like you go to the…


Did You Know Your Copy Machine Is Giving Away Your Data?

Most don’t realize it, but your copy machine is a computer - and it stores images of the things you copy! That’s right - those spreadsheets you copy for board meetings are sitting in memory! Check…


How Long Do You Have To Discover Your Data Is Under Attack?

In the attached article, writer Travis Greene explains what exposure time is, and how it differs from Protection Time...Most assume the Firewall is going to keep people out, or your password will…


Small Business - The Hackers #1 Target. Here’s What You Can Do To Lock Things Down

Experts tell us - small business is the target. There are several things you can do to tighten up security, here’s a link to 5 good ones. My favorite in this list is putting in place a process to…


SmartPhones, Smart Cars, Smart Buildings...Are they Really a Smart Decision?

Your smart building might be smarter than you think...we’re constantly recommending security assessments because, every time you choose to add  a smart anything, you’re actually extending your…


The Overlooked Tool Most Of Us Use, Is Now Stealing Passwords and More!

Warning...Those plug-ins everyone is adding to their browser (sometimes called extensions) aren’t always what they claim to be...Hackers have figured out, people download these and use them without…


The Future of The Internet of Things (IoT)

Smart Devices, smart homes, and everything connected - it’s the Internet of Things (IoT).  This video shares some of the concerns - IoT opens all kinds of new business opportunities, however it also…


These Attacks Are Nearly Impossible To Detect Without Special Expertise and Equipment...

What’s a fileless attack?  Well, most attacks on computers involve some sort of file, like a PDF attached to an email or an executable program that sits on your computer somewhere.  A fileless…


Does Incognito Mode on Your Browser Actually Keep Your Web Searches Private?

The common belief is that Incognito keeps your web life a secret. While this might change by the time you read this article, I’m posting it to show that you don’t really know what’s going on behind…