Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus – Governments Are Watching Us

Thank you Coronavirus – Governments Are Watching Us Quarntines are meant to help control those who are capable of infection from interacting with the general populace.  It is not meant to curtail all economic activity of the society. With this pandemic,...
HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack Have you purchased an HP Computer for you home or business?  Turns out that their pre-installed Support Assistant Utility is quite insecure by design.  It is capable of exposing 250 client functions and is filled with vulnerabilities...
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...
Patch As Many As You Possibly Can and Keep The Bad Guys At Bay

Patch As Many As You Possibly Can and Keep The Bad Guys At Bay

Patch As Many As You Possibly Can and Keep The Bad Guys At Bay Software updates and patches protect both your digital safety and cybersecurity. The sooner you update, the more secure you will be until the next update comes out. However, with all the cybercriminals out...
1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion – That is how much Businesses lost last year to Business Email Compromises

1.77 Billion  – That is how much Businesses lost last year to Business Email Compromises One of the most significant cybersecurity dangers to Businesses is known as Business Email Compromise attacks.  These types of attacks are carried out by cybercriminals and...