The Latest in Tech Today

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits

Pandemics breed criminal scams and exploits Mules are a common way for criminals to move their merchandise or ill-gotten gains around.  Whenever there is something big in the news, you can bet that there will be criminals who will exploit it.  It has never been more...

read more
HP Computers Vulnerable to Attack

HP Computers Vulnerable to Attack

HP Computers Vulnerable to AttackHave you purchased an HP Computer for you home or business?  Turns out that their pre-installed Support Assistant Utility is quite insecure by design.  It is capable of exposing 250 client functions and is filled with vulnerabilities...

read more
Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable!

Fingerprint Authentication is Bypassable!Eighty percent of fingerprint authentication systems were capable of being bypassed. With numerous companies marketing an alternative to password access they have jumped on biometric fingerprint athentication as the best...

read more

Time to Invest in Cybersecurity

Time to Invest in CybersecurityEvery company no matter the size is at high risk for a cyberattack.  With more and more third party and cloud business applications run the larger the risks which means that they must prepare for the next evolution of cybercrime.  Much...

read more
Watch out – Porn Scams by Email are back!

Watch out – Porn Scams by Email are back!

Watch out - Porn Scams by Email are back!Cybercriminals will try just about any tactic they can to get you to click on and accept their malware.  One of their most successful have been scams related to pornography. These scams surround the possible situation that the...

read more
How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your Land

How to Evict Attackers Living Off Your LandWhy invest in top-shelf malware just to have it be turned away by antivirus tools again and again? Why launch a cyberattack like that when your target is already full of perfectly good attack tools, just waiting for you? More...

read more
Introducing Zero-Trust Access

Introducing Zero-Trust Access

Introducing Zero-Trust Access   Working remotely has been a reality for many knowledge workers for many years, enabled by the growth and development of the Internet, Wi-Fi connectivity, and mobile computing devices. Indeed, it was this trend that powered the...

read more
The Risky Business Gamble of AI

The Risky Business Gamble of AI

The Risky Business Gamble of AIThe worldwide pandemic of Covid-19 has increased the amount of traffic on all of the social networks.  With almost everyone at home, they have more time to comment and research and share stories and opinions.  This means that these...

read more
Being Successful While Remote Working

Being Successful While Remote Working

Being Successful While Remote WorkingIf you’re starting to work from home or just got a remote position, you’re probably looking forward to not spending time on a frustrating commute and staying in your pajamas until noon. Enjoy that for the first day or two! But if...

read more
Security Must Be In Place Prior to Remote Work

Security Must Be In Place Prior to Remote Work

Security Must Be In Place Prior to Remote Work One of the biggest problems facing companies during this coronavirus pandemic is that they do not have the proper and robust enough security to support remote-work.  Many companies do not completely understand the...

read more
Your Employer Says Go Home and Work — Now what?

Your Employer Says Go Home and Work — Now what?

Your Employer Says Go Home and Work --- Now what?For many companies and their employees, this widespread hysteria over this coronavirus pandemic has taken everyone by surprise.  Remote work might have been a consideration but now is not an option but a requirement....

read more