SEVEN STEPS TO PROTECT YOUR SMARTPHONE


Our previous blog posts have examined the various cyber-based threats posed to Smartphones.  In this post, we examine seven steps that you can take to help mitigate those risks:   1. Use Two Factor Authentication:   This is also known as “2FA” for short. Two factor Authentication means that you are using two layers of […]

Read More…


5 Tips to Avoiding Ransomware


A recent blog post reviewed what Ransomware is, how it is deployed, and the types of attacks that can occur.  Essentially, it is a type of cyber-attack that can lock up your computer screen, your mission critical files, and the data that your company depends on daily.   The only way you can ever hope […]

Read More…


The Top 5 IT Certifications of 2018


A couple of weeks ago, we posted a blog that examined the benefits of making New Year’s Resolutions to further advance your career with IT Certifications. If you have taken our advice, the next step is deciding which specific certifications to get.  This can be a daunting task, as there are so many to choose […]

Read More…