a

5 Predictions for Your Future

Wild things are coming your way There’s so much changing in the IT world at this very moment—from transitioning to Device as a Service to managing the security of an increasingly mobile workforce—that it’s hard to look beyond next month, much less the next...

New Password Guidelines

New NIST Password Guidelines Recently the National Institute of Standards and Technology (NIST) released updated best practices for creating passwords. Surprisingly, NIST’s recommendations fly in the face of what we’ve been taught for a long time about...

Spam, spam, go away

Spam. In some ways, it’s the electronic equivalent of junk mail and junk phone calls. Spam is not only an unsolicited and annoying nuisance, it’s also a pervasive problem that’s clogging and overwhelming the Internet’s email systems. Spam...

Can you strengthen your weakest link?

The answer may surprise you There’s an adage in IT circles that people — both you and your employees — tend to be the weakest link in the cybersecurity chain. But that’s not entirely true. Attacks actually come from a variety of places, with 72 percent...

How to avoid a Bitcoin blackmail scam

“I know about the secret you are keeping from your wife and everyone else. You can ignore this letter, or pay me a $8600 confidentiality fee in Bitcoin”. It’s enough to send shivers down anyone’s spine, but these chilling words are part of a new scam...