Governments up the ante with cybersecurity and data privacy directives as the cybercrime wave continues at a frantic pace

Cybersecurity ended up in the eye of the storm late last year when the SEC charged SolarWinds and its CISO with fraud. It is a shot across the bow for … Continue reading Governments up the ante with cybersecurity and data privacy directives as the cybercrime wave continues at a frantic pace

With innovative technology surging, it’s time to implement these security best practices to shield your small business now.

It’s fantastic that the latest innovative technology allows us to be more connected and businesses to serve clients and customers more efficiently. Or is it? Innovation at breakneck speed often … Continue reading With innovative technology surging, it’s time to implement these security best practices to shield your small business now.

How to harness AI so it doesn’t run away with the bit in its mouth and damage your business

Governments worldwide struggle to deal with AI and the changes it’s bringing. Your company may not be playing on the world stage, but you need to harness AI to prevent … Continue reading How to harness AI so it doesn’t run away with the bit in its mouth and damage your business

How to tell if the IT consultant is blowing smoke and leading your business down the wrong path

Some of my worst business experiences involve IT consultants. Consultants that bled the small businesses for thousands of dollars while providing shoddy work and terrible advice. The employees and business … Continue reading How to tell if the IT consultant is blowing smoke and leading your business down the wrong path

How to keep the latest cybersecurity threats from damaging your business

AI can be an excellent tool for your business and cybercriminals who use it to improve attacks on your systems. They’re using AI to learn how to bypass spam filters, … Continue reading How to keep the latest cybersecurity threats from damaging your business

Did You Know your Employees are even more Vulnerable to Email Phishing than before the Pandemic?

Email phishing criminals came up with new ways to trick your employees last year. The worse news is that the old tricks are working, too. Why are employees less vigilant? … Continue reading Did You Know your Employees are even more Vulnerable to Email Phishing than before the Pandemic?

How to Handle the Latest Cybersecurity Fire around Log4j Known as LOG4Shell

Apache’sLog4j is an innocuous name for a bit of software currently setting the security world on fire. It’s free and used in all sorts of software applications. Developers insert Log4j … Continue reading How to Handle the Latest Cybersecurity Fire around Log4j Known as LOG4Shell

Why Four Years Later We’re Still Using Passwords When Safer Technologies Exist

An article from 2017 lists thirteen technologies safer than passwords. Such as vein scans, ear scans, eye scans, and fingerprints. Are we any closer in 2021 to ditching the use … Continue reading Why Four Years Later We’re Still Using Passwords When Safer Technologies Exist

How to Keep Your Intellectual Property from Walking out the Door Never to be Seen Again

Did you know your company’s intellectual property can include employee know-how? With the great resignation in full swing, are your patents, copyrights, and trade secrets, including employee know-how, safe? Here’s … Continue reading How to Keep Your Intellectual Property from Walking out the Door Never to be Seen Again

A Few Basics on How to Achieve the Best Technology Choices for Your Company

Does it seem technology moves at light speed, and your company is falling behind? Don’t worry; it depends on how you look at it. Big data, AI, and mobile technology … Continue reading A Few Basics on How to Achieve the Best Technology Choices for Your Company

Do You Know All the Apps Sniffing Around In Your Business’ Network?

Do you know what mobile apps access your business network? A recent report issued by NetSkope indicated 97% of cloud apps are uncontrolled freebies. With many working from home due … Continue reading Do You Know All the Apps Sniffing Around In Your Business’ Network?

How Hash and Encryption Algorithms Replaced Secret Messages to Protect Business Databases and fend off Cybercriminals

Cybercriminals continue to attack governments and companies around the world. It’s a global problem, and it’s growing. In the first quarter of 2021, companies in Australia, the US, Taiwan, and … Continue reading How Hash and Encryption Algorithms Replaced Secret Messages to Protect Business Databases and fend off Cybercriminals