Coca-Cola Security Breach Put Personal Information Of 74,000 Employees At Risk
Coca-Cola Experiences a Data Breach After An Employee Steals Laptops. Coca-Cola has admitted to a data breach after an employee stole dozens of laptops over the course of six years. The stolen...
Retail POS Security: Four Ways To Prevent Cybercriminals From Attacking Your Point-of-Sales Systems.
The Target and Neiman Marcus (and now Michaels) data breaches generated a lot of concern for retail businesses. The data breaches were caused by memory-scraping malware that’s designed to steal...
Google’s Chrome App Update Can Reduce Your Data Usage!
Are you tired of finding surprise data charges on your phone bill? Google’s Chrome mobile browser could now help you avoid those extra data charges from your mobile carrier! Google is adding a new...
Michael’s Craft Store Suspects They’ve Been Hit By POS Malware
The U.S. Federal Bureau of Investigation (FBI) has revealed that they’ve detected 20 hacking cases over the past year that used the same POS (point of sale) infecting malware used against Target...
Using Cloud Backup: It’s Essential To Test Your Cloud Backups On A Regular Basis.
Cloud backup offers a secure and encrypted method of protection for your critical business data. But unless you test it regularly, you won’t know if it is truly backing up all your data, or if you...
Test, Evaluate and Refresh Your Business Continuity Plan On A Regular Basis.
Your business operates in threatening time with a diverse range of technology risks, including natural disasters, cyber-attacks, and software or hardware failures. Business continuity planning is...
How Do I Know if My Computer Network is Vulnerable to Malicious Attacks?
Cybercriminals are always looking for weak points in a network system to hack the security system of your business and get confidential information. Some hackers do it for the pleasure of wreaking...
How Can Your Business Save Money by Outsourcing IT Services and Support?
Many businesses are turning to outsourcing IT as a means to reduce and control IT costs. Outsourcing IT services can minimize the number of IT personnel required, as well as decrease the cost of...
Useful iPad Apps For Your Law Practice
If you’re like other attorneys today, you use your iPad during trials, depositions and when on the go. In fact, an iPad can be an extremely useful tool as long as proper security measures are in...
If you are using Windows XP After April 8th – You Are 6 Times More Likely To Be Hacked.
Urgent Deadline Approaching Security technicians at Microsoft have compiled intelligence from a billion user systems worldwide in an effort to establish an important new metric called The Encounter...
Everything You Need to Know About E-Signatures
Electronic signature methods are becoming increasingly popular. While e-signing services vary from provider to provider, all services allow users to upload documents to an online service and apply...
Protect Your Law Firm’s Confidential Data With An iPad Security Policy.
When the iPad was released it was used as a content consumption device, suitable for playing games, surfing the web, or watching videos. Now, many attorneys are using the iPad as a productivity tool...