Using Webmail Securely

Using Webmail Securely

Using Webmail Securely Hi. Craig Peterson here with a blink into using webmail securely.   The first free Webmail email services started in 1996. Remember Hotmail and Rocketmail? My friend Gary still uses Hotmail.    Today, the most popular Webmail service is gmail,...
All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...

Bomb’s will not be Iran’s retaliation – Technological hacks are more likely

Bomb’s will not be Iran’s retaliation – Technological hacks are more likely Microsoft said on Friday that Iranian hackers, with apparent backing from the government, had made more than 2,700 attempts to identify the email accounts of current and...
Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives

Spearphishing Mobile Devices of Executives   Many businesses today use mobile technology as a primary executive communication channel. However, what happens if these devices are lost or stolen. That often is when they find the executives becoming targets of...
Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation

Saudi IT Providers Hit in Cyber Espionage Operation In what appears to be a coordinated and targeted cyber espionage campaign, the networks of several major IT providers in Saudi Arabia were attacked in the past year as a stepping-stone to the attackers’...