by Eric Clemens | Jan 3, 2018 | Android
Cybercriminals will always be eyeing your data regardless of where it’s stored. That means even your trusty Android phone or iPhone isn’t safe. In fact, it may be more exposed to security risks than you think. These tips can help increase your mobile’s security. Set a...
by Eric Clemens | Aug 28, 2017 | VoIP
Your business may be well-armed against email-based phishing scams, but you shouldn’t neglect your VoIP system. Through ‘vishing scams,’ hackers can disguise themselves as bank representatives. They can convince your employees to provide confidential financial details...
by Eric Clemens | Jul 30, 2017 | Security
You’ve all heard of viruses, spyware, ransomware and trojans. But did you know that they’re all types of malware? They’re all designed to ruin your digital life, but different types of malware put your computer at risk in different ways. Understanding what sets them...
by Eric Clemens | Apr 19, 2017 | Hardware
For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy...
by Eric Clemens | Mar 21, 2017 | Hardware
This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One...