Have you moved your email and collaboration to Office 365 or Google Apps? If so, do you know if your data is protected? The truth is that even data in cloud-based apps are vulnerable to: Damage to viruses or ransomware Deletion of end-users Errors such…
+ Read MoreSOCIAL ENGINEERING Today, I am going to be writing about social engineering, and a couple of the main social engineering strategies that are used everyday. One of the top strategies of social engineering would be one that is used everyday more often than you may…
+ Read MoreI often get asked for my opinion on what brand or processor is best along with whether or not to get a laptop or desktop. On the other hand, I hardly ever get asked about which edition of Windows to choose. I’m not talking…
+ Read MoreEnticing, but Practical? Let me preface this by saying that using Macs for business isn’t a completely terrible idea. Like anything else, you should always do what fits you best. That being said, just because it isn’t terrible, doesn’t mean it isn’t an inadvisable idea.…
+ Read MorePlease fill out all fields marked with * and submit the following form to request your consultation.