• Public WiFi: How to Stay Protected From Security Threats

    One of the conveniences of our modern world is free wireless Internet connections offered by businesses for use by their customers. This can be especially useful for employees who want to continue working or otherwise stay connected via their laptops. But many people don’t realize the security issues with using public Wi-Fi connections. Luckily, once ... Read More →

  • Rogue Access Points

    It’s common security practice for a company to make sure all their wireless access points are secured. After all, the range of a wireless access point can potentially extend to a physical area outside of the company’s control. This means that no matter how hard you try to prevent people from trespassing onto the company’s ... Read More →

  • Ransomware: How to Stay Protected

    You may have heard of a relatively new trend in computer malware. Known by the fitting term “ransomware,” it serves as a form of extortion, holding your computer and/or your data hostage until a fee is paid to the attackers, usually in the hundreds of dollars or more. Some types of ransomware are relatively easy ... Read More →

  • Securing Internet Connected Devices

    Every Internet-connected business takes measures to protect their internal network from unauthorized access. However, certain devices are overlooked by network administrators, who are mainly concerned with protecting desktop and laptop computers, smartphones, and tablets. In many cases, other devices are accessible to the Internet in some way, perhaps unbeknownst to those in charge of security. ... Read More →

  • Security of Deleting Files

    Let’s say you’re changing your computer. Your old computer most likely has private files on it that you don’t want anyone else to see, and that includes whoever is getting it. How can you make sure the new user can’t see those files? Easy, just delete them, right? You’d probably erase the hard drive and ... Read More →