Phishing Identification Checklist

Phishing attempts work when they gain your trust and make you act emotionally. For example, if an email looks like it comes from your bank, you are likely to recognize it and trust it. If it says you need to take immediate action to avoid penalties, you may be alarmed...

Complacency will cost you

Spear-phishing is on the rise Imagine spending years developing a product your research says will take the market by storm. Grow your small business into a major player. Rewrite the rules for much larger competitors. Then comes the email from a potential investor...

Show Me Your HIPAA

Imagine a world where the U.S. Department of Health and Human Services’ Office of Civil Rights came knocking on every medical practice’s door saying, “Show me your HIPAA!” Would you be able to show them your technology is compliant? While there’s no certainty that...

5 Predictions for Your Future

Wild things are coming your way There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond next month, much less the next...