Security Series Prt 2 – Two Steps Are Better Than One

Security Series Prt 2 – Two Steps Are Better Than One

You’re lucky to go a month without seeing news of some devastating data breach. With more businesses gearing up for the worst, what are you doing to protect your organization’s intellectual property and sensitive data? You can start by implementing a new type of...
Is Your Organization Utilizing Software from the Cloud?

Is Your Organization Utilizing Software from the Cloud?

All businesses require at least some type of software in order to perform as expected. It’s how organizations acquire this software that has a considerable impact on cost. For some, software can be a budget-breaking nightmare, but others have found a much more...
Are You Patched From the WPA2 Hack?

Are You Patched From the WPA2 Hack?

The world’s standard for wifi encryption is now hackable. Knowing what patches are available can be a rabbit hole. Our heroes over at ZDNet have compiled the following list of companies who were on the immediate forefront of security updates to the hack that happened...
Security Series Prt 1 – Don’t Neglect The Hardware

Security Series Prt 1 – Don’t Neglect The Hardware

“Physical security” is more or less what it sounds like: security intended to protect the physical infrastructure that houses your business and your critical data. Many business owners, and their people, are unfamiliar with the specifics of physical...
WiFi Vulnerability: What Should You Do Now? Prt 2

WiFi Vulnerability: What Should You Do Now? Prt 2

The world’s standard for wifi encryption is now hackable. What steps to take now must be taken with a grain of salt, since nobody really knows the next move of many hackers. Do they further delve into the opportunity this vulnerability has created, or do they...