Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G

Conspiracy Theorists Grasping at 5G   There are always those who will believe the most phenomenal theories when they someone with scientific authority says comments on it.  That is the case with the conspiracy theory that the radiation from 5G cell towers creates...
Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security

Businesses Must Understand The Intricacies of Cloud Security It does not matter the size of the organization or the complexity of the operations businesses have been sold on the idea that “the cloud” is the answer.  For MGM Resorts they found out that the data they...
1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises One of the most significant cybersecurity dangers to Businesses is known as Business Email Compromise attacks.  These types of attacks are carried out by cybercriminals and...
Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs Worldwide

Iranian Hackers Exploit VPNs Worldwide Last year major companies that make VPN servers were found to have security holes in them and now it appears according to a recent report that government cyber hackers from Iran have been exploiting these publicly announced...
Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data.

Be Careful of Extensions on Chrome – Many found to Upload Your Private Data. Many companies provide extensions or plug-ins for the very popular Chrome browser.  Unfortunately, some of these companies are shady and have ulterior motives that include grabbing your...
Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk

Shadow-IT: Employees putting Business at Risk There are robust computers in every employee’s possession.  And they carry them everywhere. Yes, I am talking about their cellphones.  On these devices, they can download 1000’s of apps. These apps allow them to create...
Malcare WordPress Security