If you’re not doing everything in your power to protect your data, you’re leaving your most valuable business asset open to cybercriminals! January 28th, 2018 is Data Privacy Day, an international effort led by the National Cyber Security Alliance (NCSA) annually for the purpose of raising awareness about the impo
Read MoreLaw firms once considered themselves to be immune from cyber attacks. However, this is no longer true. In fact, last year alone, cyber attacks against law firms increased. One report estimated that one in four law firms in America had suffered a significant data breach. In the UK, a recent PwC report states that 62 per
Read MoreThis is what people sometimes say when you start talking about machine language and artificial intelligence. Though it’s true that a computer can perform long, complex mathematical computations, it could never understand a small boy’s love for a cute puppy. All those emotions that humans have, all those irrational
Read MoreThere’s no doubt that Big Data, Data Mining, and Machine Learning have changed every industry on the planet. Recent political campaigns were won by experts who knew how to use all data available regarding key factors. Many were surprised to learn how certain types of information could guide a political campaign down
Read MoreThe latest updates from the Payment Card Industry Data Security Standard, known as PCI DSS 3.2, will become mandatory on February 1, 2018. This will affect all merchants and service providers who accept credit card payments from Visa, MasterCard, Discover, and American Express. The creators of this iteration believe th
Read MoreServer hardware is the backbone of all that you do in your business. With the appropriate hardware, your company can remain competitive in a world dominated by tech. Needs such as connected devices, analytics-driven processes, and social media marketing are reliant on well-functioning server hardware and devices. Witho
Read MorePotentially every Intel processor sold in the last 10 years could have a critical security vulnerability that puts users at severe risk. It’s often these days that poor IT security comes down to something like human error, and lack of awareness on the users’ part. It’s less often that there’s a widespread desi
Read MoreTwo critical vulnerabilities were found in Intel chips that could result in a malicious attacker stealing your data, such as photos, emails, documents, browsers, and password managers. How can this affect you? The vulnerabilities called “Meltdown” and “Spectre,” can affect nearly every system built since 1995.
Read MoreScam phone calls aren’t a new thing, but today’s scammers are now bolder and more sophisticated. In 2010, more than 84,000 people reported phone-related scams to the Federal Trade Commission (FTC). Scammers can spoof phone numbers from your local area code or a number that you recognize. When they call, you might
Read MoreTheft and fraud are serious causes for concern both in and out of the office, which makes education and awareness on the subject crucial. Cybercrime comes in many forms and uses many different tactics to put valuable data in the hands of hackers and scammers. Often a cybercriminal will simply focus on getting a hold o
Read More