Skip to content
Free illustrations of Hacker

The Biggest Vulnerabilities that Hackers are Feasting on Right Now

Software vulnerabilities are an unfortunate part of working with technology. A developer puts out a software release with millions of lines of code. Then, hackers look for loopholes that allow them to breach a system through that code. The developer issues a patch to fix the vulnerability. But it’s not long before a new feature update… Read More »The Biggest Vulnerabilities that Hackers are Feasting on Right Now

person in black long sleeve shirt using macbook pro

Small Businesses Are Attacked by Hackers 3x More than Larger Ones

Have you felt more secure from cyberattacks because you have a smaller business? Maybe you thought that you couldn’t possibly have anything that a hacker could want? Didn’t think they even knew about your small business. Well, a new report by cybersecurity firm Barracuda Networks debunks this myth. Their report analyzed millions of emails across thousands… Read More »Small Businesses Are Attacked by Hackers 3x More than Larger Ones

Free photos of Computer

Internet Explorer Has Lost All Support (What You Need to Know)

After being the main entry to the internet in the late 1990s and early 2000s, Internet Explorer (IE) is gone. As of June 15, 2022, Microsoft dropped the web browser from support. IE ushered in the age of connection to the world in 1995 and held a majority of the browser market share for many years.… Read More »Internet Explorer Has Lost All Support (What You Need to Know)

MacBook Pro on table beside white iMac and Magic Mouse

5 Mistakes Companies Are Making in the Digital Workplace

The pandemic has been a reality that companies around the world have shared. It required major changes in how they operate. No longer, did the status quo of having everyone work in the office make sense for everyone. Many organizations had to quickly evolve to working through remote means. During the worst of the pandemic, it’s… Read More »5 Mistakes Companies Are Making in the Digital Workplace

FTC Gramm-Leach-Bliley Act (GLBA)

  • Cy-Quest 

The Safeguards Rule affects any company or entity that offers or supports financial services, for example, dealerships and other similar industries that collect customer financial data. The new guidelines were published on December 9, 2021, giving those impacted by the changes a year to comply with the new standards and objectives. Starting December 9, 2022, amendments… Read More »FTC Gramm-Leach-Bliley Act (GLBA)

6 Discontinued Technology Tools You Should Not Be Using Any Longer

  • Cy-Quest 

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete.  Discontinued technology can leave computers and networks vulnerable to attacks. While older technology may still run fine on your systems that doesn’t mean that it’s okay to… Read More »6 Discontinued Technology Tools You Should Not Be Using Any Longer

Free illustrations of Phishing

You Need to Watch Out for Reply-Chain Phishing Attacks

Phishing. It seems you can’t read an article on cybersecurity without it coming up. That’s because phishing is still the number one delivery vehicle for cyberattacks. A cybercriminal may want to steal employee login credentials. Or wish to launch a ransomware attack for a payout. Or possibly plant spyware to steal sensitive info. Sending a phishing… Read More »You Need to Watch Out for Reply-Chain Phishing Attacks

5 step business guide to changing IT provider

In this article, we outline the key areas to cover when changing IT provider. This is going on the assumption that the business has either: 1) A fully outsourced IT company is providing relevant IT services. 2) Internal IT department/staff that require 3rd party support for certain aspects of the technology function in the business. Step… Read More »5 step business guide to changing IT provider

Free illustrations of Cybersecurity

What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?

Few things invoke instant panic like a missing smartphone or laptop. These devices hold a good part of our lives. This includes files, personal financials, apps, passwords, pictures, videos, and so much more. The information they hold is more personal than even that which is in your wallet. It’s because of all your digital footprints. This… Read More »What Should You Do to Reduce Risk When Your Mobile Device Goes Missing?