Blog


  • 12 Apr

    Why Should You Implement a BYOD Program?

    Mobile Security

    Phones and tablets are always within fingertips reach, making them the perfect tool for business. But checking your email using the coffee shop’s free wi-fi while grabbing your latte or opening that email from a potential client could be more harmful than beneficial.

    Read More



  • 08 Mar

    Fileless Malware: The Malware that You Won't Know is There

    Fileless Malware

    Virtually undetectable, effective, and while not lethal, still devastating. It’s not a poison or gas- but fileless malware.

    What is Fileless Malware?

    Occasionally know as non-malware, it’s memory-based malware that lives in your computer’s RAM, doesn’t use software, and attacks vulnerabilities within the computer’s operating system and current software programs.

    Read More



  • 22 Feb

    Cybercriminals are Phishing- Don't Take the Bait!

    Phishing

    5 years ago, if you received an email from an African prince requesting $500 from you to receive his inheritance and a promise to pay you back $10,000 you’d know it’s spam and delete it.

    Today, technology and spam have evolved- employing techniques that seek information ranging from login credentials to potential targets- techniques like social engineering.

    Read More