Security

Heiden Technologies: Safe, Secure, and Verified by Experts

Guest author: Jason Rorie, CSIE, MCSE, C|EH, CISM, CCSP, and CISSP It’s no secret that cybercrime is on the rise and that businesses of all sizes are being targeted, phished, scammed, and breached. And you’ve almost certainly heard about the most recent trend in malicious hacker activity: targeting IT managed services providers. You may have …

Heiden Technologies: Safe, Secure, and Verified by Experts Read More »

Boosting Your Security Only Takes Another Layer of Authentication

Data breaches are so common nowadays that you’re lucky not to see one in the breaking news section of any news outlet. How is your business preparing for the inevitable data breach of intellectual properly and sensitive information? You need to start considering preventative measures, like two-factor authentication, to keep your data secure. The main …

Boosting Your Security Only Takes Another Layer of Authentication Read More »

“It Redirected Where?” — A Case Study in Security Precautions

Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more… adult… than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they had let their IT administrator go. The administrator, Tavis Tso, created a web in …

“It Redirected Where?” — A Case Study in Security Precautions Read More »

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling

The holidays are approaching, whether we are ready for them or not. With the holidays comes time off, which means that it’s awfully easy to fall behind post-vacation. Another concern is the amount of identity theft and credit card fraud that comes about during this time of year. We’ll discuss some of the many ways …

Tip of the Week: The Holidays Can Be A Time Of Work And Play, Even While Traveling Read More »

Cybercriminals Who Use This Malware Will Get A Nasty Surprise

Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute malware and other threats. What’s worse than this, you ask? …

Cybercriminals Who Use This Malware Will Get A Nasty Surprise Read More »

Your Guide To Mobile Device Management as an SMB

The use of mobile and personal devices for work purposes can be beneficial to your business operations. When handled, and supported properly, they have been shown to improve communication methods and increase productivity. However, the popularity of mobile computing, as well as the Internet of Things’ rapid expansion, means it’s more important than ever to …

Your Guide To Mobile Device Management as an SMB Read More »