Blog

Simplify and Separate Your Network

Simplify and Separate Your Network

These days, more and more businesses are doing more and more things on the internet. Phones, video surveillance cameras, and other devices have become almost as popular as the computers sitting on every employee’s desk. But if you have all of these devices all sharing the same internal network, you might be endangering your ability to conduct business, your online security and the physical security of your entire facility.

Should You Move To The Cloud?

Should You Move To The Cloud?

Is your business growing? That’s great news! But often business growth comes with its own set of challenges. You might need bigger offices, new desks and…new technology. But if you think back to when you last bought servers for your business (and everything that went with it), you might remember that it was a very expensive investment.

Are You Prepared For Business Continuity

Are You Prepared For Business Continuity

What would you do if you lost $145 million? File for bankruptcy is a likely answer. Here’s a better question: What would you do to prevent losing $145 million? The answer to that second question is apparently “nothing” for a Canadian cryptocurrency exchange called QuadrigaCX. They recently filed for bankruptcy because their company founder and CEO passed away while on a business trip, and he was the only person who had the encryption keys for $145 million in cryptocurrency that his exchange was holding for its clients.

The New Era of Cyber Security

The New Era of Cyber Security

Protecting your computer networks and your data is getting more and more difficult. Cyber criminals are getting more sophisticated, and the attacks that they create are more creative than ever. If they can’t install a trojan-infected file on your computer, they create a file-less attack.

Why Full Disk Encryption Isn’t Enough

Why Full Disk Encryption Isn’t Enough

Many of our clients tell us that they believe their data is secure because they have “full disk encryption” -- typically the BitLocker that comes with Windows 10 -- enabled on their computers. But it’s very important for you to know what full disk encryption is, what threats it can protect you from, and what threats it is defenseless against.

Fileless and Zero-Day Attacks

Fileless and Zero-Day Attacks

Many computer users think that if they have a good Anti-Virus program running on their computer, that their computers will be safe from hacks and threats. IT security professionals have long known that is not the case, but now two newer types of attacks are proving it more often than ever.