[Webinar May 31th] Coffee, Red Bull and 802.11ac – Get Wired without Wires from Cisco

POSTED BY ON Wed, May 24, 2017

Red Bull is not the only way to get WIRED. And you don’t have to jump from the stratosphere to experience blazing speed. 802.11ac Wave 2, the emerging standard from the IEEE, is like Red Bull for wireless devices.

Sharing Smiles Day - May 21, 2017

Sharing Smiles Day—Free Dental Care for Kids in Need (May 21)

POSTED BY ON Wed, May 17, 2017

We are proud to help spread the word that our friend and client, Kool Smiles, is holding their annual “Sharing Smiles” free care day on Sunday, May 21.

Facebook and Google are Swindled for more than $100 Million—Here's the Lesson

Facebook and Google are Swindled for more than $100 Million—Here’s the Lesson

POSTED BY ON Fri, May 12, 2017

Basically, this was an elaborate Phishing attack. While some companies are taking steps for preventing such attacks, here’s what they’re doing wrong.

Employee Training Improves Retention, Productivity and Cyber Security

POSTED BY ON Fri, Apr 21, 2017

I bet that last one, Cyber Security, caught you off-guard. More on that in a minute!

We are all busy people. For many of us, fitting all our work into any given day feels like a massive challenge. Against this backdrop, the notion of taking time away from our “jobs” for training seems completely impossible.

7 Must-Knows About Security Spending in 2017

7 Must-Knows About Security Spending in 2017 [SlideShare]

POSTED BY ON Fri, Mar 31, 2017

Worldwide spending on security-related hardware, software and services is expected to reach $90 billion in 2018, up from $73.7 billion in 2016, according to research by IDC. Check out the slides..

AWS Cloud Outage

Is Your Data Safe in the Cloud? A Reflection of the AWS Outage

POSTED BY ON Fri, Mar 10, 2017

Cloud computing has given the technological world a much-needed gift in the form of easy storage and access. Whether you are an app developer, app user or binge-watcher of shows, the cloud provides you with the flexibility to operate from everywhere without losing any of your data.

Recent Wordpress Vulnerability Hacks Millions of Pages Here's the Lesson

Recent WordPress Vulnerability Hacks 1.5 Million Pages—Here’s the Lesson

POSTED BY ON Fri, Feb 24, 2017

Vulnerabilities within third-party software might be your greatest risk, because you can’t control or influence the code. And once the the fix is out, the cat’s out of the bag. It becomes a “known vulnerability”. Known to the manufacturer/developer, known to its customers and most significantly, known to attackers.

D-Link Camera

FTC sues D-Link for Gross Lack of Security—Are You Protected?

POSTED BY ON Tue, Feb 7, 2017

The lawsuit comes after major distributed denial of service (DDoS) attack in October last year affected a number of prominent websites and services, driven by […]

[WEBINAR] Exposing the Risks with Transport Layer Security

[WEBINAR] Exposing the Risks with Transport Layer Security Feb. 1, 2 PM ET

POSTED BY ON Thu, Jan 26, 2017

Many organizations and email providers endeavor to reduce risks by sending emails over Transport Layer Security (TLS) believing that TLS protects sensitive and confidential data. […]

Video: How to Recover a System From a Locky Ransomeware Attack

Video: How to Recover a System From a Locky Ransomeware Attack

POSTED BY ON Fri, Jan 13, 2017

It is not a question of “if”, but “when” you’ll suffer an attack. Will you be ready and able to deal with it? Here are some steps you can take.

Here’s How to Save Thousands of Dollars Before the End of 2016

POSTED BY ON Wed, Dec 21, 2016

Realize huge savings before the end of the year with IRS Sec. 179 deduction and Cisco Capital 0% financing! Learn more…

Why Hackers "Farm" and How to Avoid Being Extorted

Why Hackers “Farm” and How to Avoid Being Extorted

POSTED BY ON Fri, Oct 28, 2016

Hacking 101 is much like Sales 101. If you close a deal with a “customer” and have “success”, you’d go back and do more business together, wouldn’t you? You’d “farm” the account because now there is a relationship. And hackers do the same thing