Have you moved your email and collaboration to Office 365 or Google Apps? If so, do you know if your data is protected? The truth is that even data in cloud-based apps are vulnerable to: Damage to viruses or ransomware Deletion of end-users Errors such…
+ Read MorePasswords. Everyone has them and most probably don’t follow secure-password methodology. Have you ever used “password” as your password? Have you used the same password for multiple logins? When was the last time you changed your passwords? If you answered “Yes” or are unsure to…
+ Read MoreSOCIAL ENGINEERING Today, I am going to be writing about social engineering, and a couple of the main social engineering strategies that are used everyday. One of the top strategies of social engineering would be one that is used everyday more often than you may…
+ Read MoreI often get asked for my opinion on what brand or processor is best along with whether or not to get a laptop or desktop. On the other hand, I hardly ever get asked about which edition of Windows to choose. I’m not talking…
+ Read MorePlease fill out all fields marked with * and submit the following form to request your consultation.