Hackers routinely use phishing as a method of acquiring sensitive information from unsuspecting victims. This information is then either sold or used to commit identity theft. There is a particularly dangerous phishing attempt currently targeting Gmail accounts. More...
There is a disconnect inherent between business and security objectives for today’s businesses. While business is postured to grow, improve, take risks, and always move forward, security seeks to protect, control, ensure compliance, and mitigate risk. With the...
A new year always brings new predictions for what will be trending and what we can all look forward to in the news, politics, entertainment, and more. In the world of technology, innovations and advancements are a fast, steady stream as developers make everything...
Happy 2017! As you enter a new calendar year, it’s likely that you are making big plans and setting new goals for your business. You’re analyzing what worked well in 2016 and making a list of changes that you believe will yield higher results for 2017. As technology...