A New Form of Ransomware Targets Mac Computers As Well As PCs
Ransomware is malware used specifically for cyber data kidnapping. Cryptolocker, an updated form of ransomware, is used by cybercriminals to encrypt a victim’s data with[...]
Protecting Your Company Secrets and Data
With any business, there are many security challenges that continually arise in a variety of forms. Sometimes, it’s your company secrets—in other instances it’s your[...]
Law Firms Today Must Adopt Up-To-Date IT Practices To Stay Competitive and Protect Client Data
Law firms have two primary motivations when implementing new information technology (IT). To help them analyze diverse and extensive amounts of data, and to increase[...]
URGENT VIRUS ALERT: CryptoLocker
There is a new and very serious virus named CryptoLocker which is currently circulating the Internet. The threat involves an e-mail attachment that, if opened,[...]
Cloud Computing For Insurance Companies: Important Items To Know
According to reports from research firm Celent, information technology helps to address key data concerns in the insurance industry. Knowledgeable insurance agents are looking to[...]
How to Use Airport Wi-Fi Safely
Many business professionals travel and conduct business using open wireless networks and hotels, coffee shops and other wireless networks. Often, business professionals are found sending a[...]
Unofficial Version of BBM for Android and Apple Delays the Official Release
This past weekend, BlackBerry planned on releasing BlackBerry Messenger (BBM) to Android and Apple smartphone users. However, the release was suspended due to an unreleased[...]
Fake LinkedIn Invites Hitting Our Inbox Daily
Scams that prey on business professionals are everywhere. Some scams that pretend to be legitimate organizations can be very hard to detect. One that your San Jose[...]
Virus Warning: A New Type of Ransomware That Targets Organizations: Watch Out for CryptoLocker!
Earlier this year, a new type of ransomware appeared onto the scene; a variant of a security threat called CryptoLocker. The vulnerability becomes enabled when[...]
Have you downloaded the new Apple iOS7 upgrade yet?
Apple announced iOS7 in June. After successfully completing 6 beta versions, Apple’s mobile customers can officially download the anticipated upgrade on their iPhone, iPad and[...]
The End of Microsoft XP Support Will Be a Profitable Gold Mine for Hackers
You’ve heard the warnings about the impending end of support for Windows XP, and Microsoft has attempted to increase the number of its Windows 8[...]
Important Factors to Consider When Implementing A BYOD Policy
The BYOD (bring your own device to work) trend has many benefits. Employees are happier when they’re using their own computer devices, and they also[...]