
Attention Retailers! You’re A Prime Target For Cyber Criminals
We Can Help To Protect You and Your Business Reputation. As a retail organization, large or small, you must protect your sensitive customer data. It’s[...]

Top 5 Most Reasonable Battery Saving Tips for iPhone 5
There is a collection of tips on the internet for saving your phone battery. Some of them, though, seem unrealistic, such as dimming your screen[...]

Is Your IT Personnel Cheating On Your Disaster Recovery Tests?
A disaster recovery test evaluates your business continuity and disaster recovery plans to ensure they are functional and efficient in the event of a disaster.[...]

Customer Sues Michaels Store Due To Data Breach
On January 25th, 2014, Michaels, the world’s largest arts-and-crafts retailer, announced that it “recently learned of possible fraudulent activity on some U.S. payment cards that[...]

Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk
Coca-Cola Experiences a Data Breach After An Employee Steals Laptops. Coca-Cola has admitted to a data breach after an employee stole dozens of laptops over[...]

Retail POS Security: Four Ways To Prevent Cybercriminals From Attacking Your Point-of-Sales Systems
The Target and Neiman Marcus (and now Michaels) data breaches generated a lot of concern for retail businesses. The data breaches were caused by memory-scraping[...]

Google Is Testing A New “Smart” Contact Lens
Did you know diabetes affects 1 in 19 people in the world? It’s a daily struggle for these people to control their blood sugar levels.[...]

Michael’s Craft Store Suspects They’ve Been Hit By POS Malware
The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point[...]

Using Cloud Backup: It’s Essential To Test Your Cloud Backups On A Regular Basis
Cloud backup offers a secure and encrypted method of protection for your critical business data. But unless you test it regularly, you won’t know if[...]

Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis
Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning[...]

How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?
Cybercriminals are always looking for weak points in a network system to hack the security system of your business and get confidential information. Some hackers[...]

Important Deadline For All Healthcare Organizations!
You Must Comply With ICD-10 By October 1st, 2014. The ICD-9 code sets that are currently being used to report inpatient procedures and medical diagnoses[...]