Stephen L

Where Do Malware Creators Come From? The Nexus Between Crime Rings, Rogue Governments and More

Over the last ten years in particular, there has been a staggering increase in malware infections to the tune of 87%. On average, malware attacks cost businesses in the United States approximately $2 million per incident, once things like reputational damage and recovery costs are accounted for. At the same time, all of this does …

Where Do Malware Creators Come From? The Nexus Between Crime Rings, Rogue Governments and More Read More »

All the Warning Signs You Need to Watch Out For to Spot a Phishing Email

It’s no secret that the Internet has gotten significantly more dangerous in the last decade. In the 1990s, we only had to worry about accidentally downloading a malicious file from a rogue website that would inadvertently trigger a cyber- attack. Flash forward to today and the potential attack sources are seemingly endless, with phishing attacks …

All the Warning Signs You Need to Watch Out For to Spot a Phishing Email Read More »

What Your Employees Need to Know About Avoiding Social Engineering Attacks on the Internet

Believe it or not, the vast majority of all cyber attacks in the modern era still occur for the same reason: they’re the result of your current employees. Now, while it’s true that some of these attacks are an inside job, such as an employee who is leaving your company taking as much proprietary data …

What Your Employees Need to Know About Avoiding Social Engineering Attacks on the Internet Read More »

Why Operating System Upgrades Are Far More Important Than You Realize

One of the most important parts of any computer is also, unfortunately, the one that people don’t spend too much time thinking about: the operating system. In a lot of ways, the OS is the “brains” of any particular workstation. It’s what allows you to get online and to access all of the applications that …

Why Operating System Upgrades Are Far More Important Than You Realize Read More »

Here’s the Situation With Apple’s New Photo Scanning Technology and Privacy

For years, Apple has billed itself as a champion for privacy on behalf of its users. The biggest example of this is likely their dispute with the FBI in 2016, when it refused to help unlock the iPhone recovered from a participant in a mass shooting event in San Bernardino, California. One of the shooters …

Here’s the Situation With Apple’s New Photo Scanning Technology and Privacy Read More »

Cybersecurity Education Security Seminar Teaching 3d Illustration Shows Online Training Of Cyber Skills For System Protection

Why Ongoing Education is the Key to Better Cybersecurity for Businesses of All Sizes

According to one recent study, the total number of malware infections taking place across just about every industry hasn’t just been on the rise over the last decade – they’re absolutely exploding. There were approximately 12.4 million malware infections all the way back in 2009, for example. Flash forward to just a few years in …

Why Ongoing Education is the Key to Better Cybersecurity for Businesses of All Sizes Read More »

Woman Sleeping In Bed With Sleep Data App Running On Mobile Phone On Bedside

Technology Best Practices That Will Help You Sleep Better at Night

Over the years, technology and especially the Internet have become an omnipresent part of our lives. Even if you go back to the 1990s, computers weren’t really commonplace in many people’s homes. They were devices you interacted with – likely briefly – at work or school. If you had access to an Internet connection – …

Technology Best Practices That Will Help You Sleep Better at Night Read More »

Cyber Security Email Phishing Ransomware Internet Technology 3d Illustration

Best Practices for Staying Safe From a Ransomware Attack

If you had to make a list of some of the most concerning malware trends making their way across the Internet today, ransomware would undoubtedly be right at the top. For those unfamiliar, ransomware is a particularly nasty form of malware that actually encrypts the files on a victim’s computer – essentially holding all of …

Best Practices for Staying Safe From a Ransomware Attack Read More »

Young Black woman and a graphical interface to the Internet of Things

How to Start Leveraging the Internet of Things For Your Business

The Internet of Things, as the name suggests, is a term referring to a network of countless “smart” devices that are all connected together, creating and sharing data with one another at all times. According to one recent study, there will be an incredible 35 billion devices connected to the Internet of Things as soon …

How to Start Leveraging the Internet of Things For Your Business Read More »

Facetime and Zoom icons on a coputer screen

With iOS 15, FaceTime May Finally Be in a Position to Challenge Zoom

In early March 2020, as the COVID-19 pandemic began to take hold around the world, millions of people suddenly found themselves in desperate need of productivity tools at home. They’d left their offices and schools for the last time – many without even realizing it – and needed to find a way to keep moving …

With iOS 15, FaceTime May Finally Be in a Position to Challenge Zoom Read More »

The fact sheet of the American Jobs Plan, the infrastructure plan by the Biden Administration released on March 31, 2021 is seen on the White House website on a phone.

What the Biden Administration’s Infrastructure Plan Could Mean for Smart Cities

Everyone knew that smart cities were the way of the future – it’s just that few could have anticipated that the future would have come along quite as quickly as it has. In large part thanks to the COVID-19 pandemic, our embrace of a smarter future in urban environments has been dramatically accelerated.  According to …

What the Biden Administration’s Infrastructure Plan Could Mean for Smart Cities Read More »

3d illustration of Application software programming source code. Open source concept.

If We Want to Live in a Future of Smart Cities, We Need to Embrace Open Source Today

Regardless of how you choose to look at it, smart cities bring with them a host of unique advantages and opportunities – essentially all at the exact same time. People now expect a great deal from the urban areas they choose to live in. They want expansive, robust access to digital services. They’ve shown themselves …

If We Want to Live in a Future of Smart Cities, We Need to Embrace Open Source Today Read More »

Blurred inage of Amazon Privacy

Here’s What the New Amazon Ring Doorbell Policy About Police Requests Means For Your Privacy

On the one hand, it’s easy to see why having a device like the Amazon Ring Doorbell installed on your house is incredibly convenient. For those unfamiliar, the Ring operates a lot like a traditional doorbell, albeit with a twist. It has a camera installed on the front of it, allowing you to always see …

Here’s What the New Amazon Ring Doorbell Policy About Police Requests Means For Your Privacy Read More »