Blog

What to learn from Sony’s security breach

What to learn from Sony’s security breach

The scale of the recent security breaches at Sony, which led to the cancellation of The Interview’s theatrical release, can make the company’s problems seem beyond the realm of the average small business. But the security mishaps that created the circumstances for the hack are as applicable to modest local and regional companies as they are to multimillion dollar corporations.

What to expect from Apple in 2015

What to expect from Apple in 2015

Looking back at it, 2014 was a great year for Apple. From the iPhone 6 to iOS 8 and OS X Yosemite, along with other new products, there were many useful products and systems introduced. Now it is time to look forward to 2015 and what tech developments we might benefit from in the year ahead.

What happens when an antivirus expires?

What happens when an antivirus expires?

An antivirus scanner is one of the most essential parts of any security plan. These useful programs scan computers and systems for potential infections and get rid of them, ensuring your files and systems are safe. Because many of these protection programs are subscription based however, it can be easy to let the validity expire.

New spear phishing attack identified

New spear phishing attack identified

When looking into the ways companies are hacked, you quickly realize that there are so many different tactics out there that it is mind-boggling. One of the more effective methods used recently is spear phishing, and in early December 2014, a new spear phishing attack was uncovered.

Looking at online backup solutions

Looking at online backup solutions

There are many different backup solutions out there available to small and medium sized businesses. While most owners are aware of the fact that any backup solution is important for a Disaster Recovery Plan, it can be tough to pick the right one for your business.