Recycling Disks the Wrong Way can Bite you!

Recycling Disks the Wrong Way can Bite you!

Recycling Disks the Wrong Way can Bite you! ​ Recycling old technology is big business. Companies employ life cycle management for their IT hardware. Disposing of used servers, storage, and networking equipment on your own can be expensive and time-consuming and often...
Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
“Technology Help” Cybercriminals Scam Seniors into Paying Thousands

“Technology Help” Cybercriminals Scam Seniors into Paying Thousands

“Technology Help” Cybercriminals Scam Seniors into Paying Thousands Computers began during our seasoned citizens lifetime. They did not grow up with them, and this places them at a distinct disadvantage when it comes to their level of understanding. Senior citizens...
Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them

Audit Logs May Help You Make Your Case — If You Have Them   Most businesses today are fielding malicious attacks on a daily and sometimes hourly basis. Do you keep audit logs of the activity on your computer system? Logs can act as a red flag to identify when...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...