rss

Latest Articles

Contributor Articles on Information Technology and Security

6 Tips for Protecting Your Social Media Accounts

6 Tips for Protecting Your Social Media Accounts

10 years ago, many of us were hearing about social media for the first time. Now, social media plays a giant role in our lives, allowing us to share pictures, connect with family and friends, and get updated news. Through social media, we can express ourselves to our inner circle and the world.


3 Ways We are Tricked into Cyber Attacks

3 Ways We are Tricked into Cyber Attacks

So just how are hackers able to penetrate all these huge businesses? Look no further than employee behavior—not an inside job, but innocent employees being tricked by the hacker. A recent survey commissioned by Intel Security reveals that five of the top seven reasons that a company gets hacked are due to employee actions.
Pulling Back the Curtain on Cloud Myths

Pulling Back the Curtain on Cloud Myths

Are you considering moving aspects of your business into the cloud?   Change is scary for many people—and so too it goes in the business world. While the statistics prove businesses are continuing to migrate to the cloud, not all are doing so without trepidation. While any decision that will transform a business’ day-to-day operations shouldn’t be taken lightly, it’s important that executives take the time to separate fact from fiction and cast an eye toward a technology revolutionizing the business place.