Looking for Something Specific?
Search the Blog Archives.
PowerPoint is an amazing, multi-faceted software program from Microsoft that allows users to create professional-looking slideshows. These presentations have evolved from being a novelty to an essential part of everyday business around the world. The slideshow format makes it easy to tell a story that can be shown on a projector or TV. This program […]
This Ransomware Survival Guide will help your employees master the skills to prevent downloading or linking to malicious ransomware threats. It will help them recognize phishing emails, malicious links and what to do when they find them. It will help you protect your organization and: Prevent ransomware attacks. Ensure your employees can continue working after […]
Cyber breaches have become the norm across the United States and in many parts of the world. Regardless of the size of your company or your budget for security, your company could be at risk. This has caused rapid growth in the cybersecurity industry. According to Forbes, this market will reach 170 billion dollars by […]
Not-for-profit organizations frequently contend with the lack of time and money necessary to afford large IT investments that are critical for achieving efficiency in their operations. Those organizations that can afford these technologies constantly have to deal with scarce resources and manpower needed to manage the technology. There is another glaring problem within the nonprofit […]
The recent announcement of the vulnerabilities found in the Intel, ARM, and AMD processors has sparked a new phishing campaign – not the good kind of fishing with bait and largemouth bass. Although, these hackers are using a particular kind of bait. While Meltdown and Spectre require access to your system, hackers have various ways […]
Your manufacturing company is in the crosshairs of hackers. Cyber-spies are using backdoor viruses to steal intellectual property from businesses like yours. According to Verizon’s 2017 Data Breach Investigations Report, these cyber-spies are supported by nation states. 620 of data breaches hit the manufacturing sector last year, and 94% were committed by state-affiliated actors. 91% […]
If you don’t know what the GDPR is, and if you’re not ready for it, you’d better read on or watch our webinar on demand by clicking here. The General Data Protection Regulation goes into effect May 25, 2018. It’s a privacy law the European Union is enforcing to protect the personal data you collect […]
The European Union’s General Data Protection Regulation goes into effect on May 25, 2018. Many U.S. and Canadian businesses have been working hard to meet the new GDPR guidelines., but it’s not clear if others have the technology in place to notify individuals that their data was breached within the required 72-hour period. This is […]
On May 7th, all smartphones on an LTE network will receive a test notification for the new Public Emergency Alert System. Don’t let it catch you off guard – coming up on May 7th, 2018, if you live in Ontario or Quebec, your smartphone will receive a test alert for Canada’s Public Emergency Alert System. […]
As a parent, it can be difficult to keep up with the latest potential technology dangers facing our children. So, I was thankful to find the following information about one of today’s very popular Internet games – is your child playing Fortnite Battle Royale? Should you be worried? You might want to get up to […]