a

Are social logins safe to use?

used with permission from Norton by Symantec By now you’ve noticed you typically have two options to log in to an online account. One is the traditional username and password combination. The other is the social login, which uses your credentials for a social...

How to find your office Zen

used with permission from HP Technology at Work Sometimes we all need to step away from our work and take a little break. But often, actually leaving the office isn’t an option. So what do you do when you need a quick mental vacation? Thankfully, the same...

EQUIFAX DATA BREACH – Are you vulnerable?

EQUIFAX DATA BREACH  on September 7, 2017 On Thursday, September 7th, Equifax the credit monitoring company announced that a huge security breach.   This security breach exposed sensitive personal identifying information of up to 143 million Americans.  This data...

Holiday Closure Labor Day 2017

[vc_row type=”in_container” scene_position=”center” text_color=”dark” text_align=”left”][vc_column column_padding=”no-extra-padding” column_padding_position=”all”...

2016: A Year of Cyberattacks and Hacking

2016 has been filled with news of cyberattacks and hacking • In February the Central Bank of Bangladesh was the victim of a cyber heist that resulted in $81 million in losses    and another $850 million in halted transactions. • In July, the Democratic National...

Work with us!  Be part of one of the fastest growing IT firms in Southern Oregon.

X