All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not

All Businesses are Tech Businesses – Like it or Not The world of information is remaking businesses with new technologies turning all businesses into technology companies like it or not.  Companies who continue to believe that they are not technology companies...
Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable Pulls Plug

Home Security and Alarm Systems Useless After Charter Cable  Pulls Plug What happens when a cable company shuts down a product they previously sold to customers?  What happens when they refuse to refund customers for proprietary products they purchased to support the...

Routers and Firewalls with Broadcom Chipsets Are Vulnerable

Routers and Firewalls with Broadcom Chipsets Are Vulnerable Have you heard of the router/firewall critical vulnerability called Cable Haunt? Well, for 200 million worldwide users, this could soon be a nightmare come true. Cable Haunt allows a hacker to compromise the...
The hanging of an MSP “Shingle” and Your Business Security

The hanging of an MSP “Shingle” and Your Business Security

The hanging of an MSP “Shingle” and Your Business Security   Are you in the cross hairs of hackers? How can a hacker multiply his efforts? By attacking a company who protects other companies.  Hackers new targets are the Managed Services providers (MSPs) because...
Are Your Cloud Vendors Paying Attention to Security?

Are Your Cloud Vendors Paying Attention to Security?

Are Your Cloud Vendors Paying Attention to Security?   Cloud adoption is on the rise: According to International Data Corporation (IDC)’s “Nine Ways to Maximize the Value of Cloud Contracts,” 52 percent of all companies are currently using cloud-based delivery...