You likely have antivirus (AV) software in place at your business. (And if you don’t, the never-ending stream of high-profile data breaches should be enough to convince you that you should have AV in…
In a world where data leaks, high-profile breaches, and identity theft have become everyday occurrences, it should be no surprise that cybersecurity is being called the hottest career of the…
In the last few years, it is hard to talk about computer security without the word “Cryptowall” being brought up. In February, Hollywood Presbyterian Medical Center was hit by this strain of infection…
As today’s companies increasingly depend on digital assets, information security has become an even more critical factor of the business model.
A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014. But are there…
With mobile technology progressing at ever-more-breakneck speeds – the latest smartphones nearly rival the combined computing power that enabled the original moon walk – can scams be far behind? Is…