Understand these 4 types of hackers

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting anothe

keep Reading

Improved email security for Office 365

While you can take many security precautions to protect your organization, a cyber attack is always possible because of human error. Microsoft, howeve

keep Reading

4 BYOD security risks you should address

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can

keep Reading

4 things you should know about the cloud

From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services among busine

keep Reading