• How to Properly Erase and Dispose of a Computer Hard Drive

    How to Properly Erase and Dispose of a Computer Hard Drive

    There are two main issues involved in safely disposing of old computers (one could say “recycling” is a better word than disposal). One deals with completely erasing hard drives of any protected, classified, or restricted-access data, and the other has to do with the eco-safe disposal of the hardware itself. With so much focus on […]
  • Beat It! Cracker!

    Beat It! Cracker!

    How to Discern Between Crackers and Hackers While the pejorative term “hacker” has become largely synonymous with one who has malicious motivations, the more appropriate appellation is “cracker”. The difference lies in the fact that hackers (a.k.a. white hat hackers) are by and large internet security experts who create better security procedures and policies using […]
  • How Ransomware and Malware Affect Small & Midsize Business

    How Ransomware and Malware Affect Small & Midsize Business

    Many Small to Midsize businesses are having to re-think their disaster recovery and business continuity strategies due to the recent spike in ransomware attacks in recent years, but also because of malware infection in general and how it operates. Many enterprise owners and staff don’t even know what a ransomware attack looks like. And, with its […]
  • How Workspace as a Service Can Expand Your Business Possibilities

    How Workspace as a Service Can Expand Your Business Possibilities

    If you’re not familiar with workspace as a service, or WaaS for short, it’s a type of virtual desktop that allows employees and contractors working for or with a certain business entity access to a number of applications and data – and, from any location in the world. They can also do this on any […]
  • Is Your Password Compromising Your Security?

    Is Your Password Compromising Your Security?

    With so many threats to look out for, some business owners make the mistake of thinking that a simple security tactic such as your password is ineffective – but that’s not true. Your password is your first line of defence, keeping hackers and other intruders from accessing devices, resources, and applications that could seriously compromise […]
  • Annual Global Cybercrime Costs to Exceed $6 Trillion by 2021

    Annual Global Cybercrime Costs to Exceed $6 Trillion by 2021

    According to a recent Cybersecurity Ventures report sponsored by Herjavec Group, projections have it that cybersecurity defense costs will exceed six trillion dollars by 2021. This will be double the cybercrime expenditures paid out in 2015. This is a staggering figure, even when taking into account the many millions of dollars paid out in fines […]
  • Yahoo Data Theft Good Reason to Regularly Change Passwords

    Yahoo Data Theft Good Reason to Regularly Change Passwords

    In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]
  • Massive Yahoo Hack Further Argument for Better Password Protection

    Massive Yahoo Hack Further Argument for Better Password Protection

    A 2014 Yahoo hack potentially represents by far the biggest data theft on record, with information involving up to 500 million accounts stolen. Yahoo is blaming “state-sponsored” hackers, but it appears that that remark may be diversionary, as evidence of an inside job is likelier. The email host, news, and search engine giant claims that […]
  • When to Add Server Monitoring Service to Your IT To-Do List

    When to Add Server Monitoring Service to Your IT To-Do List

    Anyone with any kind of business that wants to improve their IT productivity and performance quotient should look into server monitoring. The main reason to monitor server performance is for troubleshooting problems. With proper server monitoring tools in place, you can use the available resources at hand to track down the server problems and correct […]
  • Is Your Incident Response Plan a Disaster Waiting to Happen?

    Is Your Incident Response Plan a Disaster Waiting to Happen?

    Even with the most carefully thought-out disaster planning, unintended consequences and sub-par performance can often be the result. In part, these undesirable outcomes occur because they are based on theory rather than actual experience. In many areas subject to specific natural disasters, the incident response or disaster plan might be called, “Earthquake Preparedness Plan” or […]
  • USB “Kill Drive” Will Literally Meltdown Any Computer It’s Plugged Into

    USB “Kill Drive” Will Literally Meltdown Any Computer It’s Plugged Into

    It sounds like the premise for a bad horror movie, but it’s not. The USB Kill Drive can reportedly fry an entire laptop or PC utilizing some kind of “worse-than-ransomware” nightmare program. It’s also known colloquially as a “kill stick,” and there are verified reports of this malicious USB drive being able to kill any […]
  • What Do Passwords and 2FA Have In Common?

    What Do Passwords and 2FA Have In Common?

    Soon, They’ll Both Be Obsolete as Biometrics Enter the Mainstream Google recently announced plans to replace digital passwords with biometrics using their “Trust API” system. Trust API monitors location, speed, voice, and typing patterns, so devices can “learn” about their owners and how their owners operate.   Consumers appear to be fully on board. According […]