6 Discontinued Technologies You Should Not Be Using Any Longer

One constant about technology is that it changes rapidly. Tools that were once staples, like Internet Explorer and Adobe Flash, age out. New tools replace those that are obsolete.  Discontinued technology can leave computers and networks vulnerable to attacks.While older technology may still run fine on your systems that doesn’t mean that it’s okay to…

Explaining Cybersecurity Audits (And the Three Tips for Running One)

You need more than the latest antivirus software to ensure your company’s network is secure. A cybersecurity audit helps you create a complete picture of your security strategy. Cybercrime has grown into one of the epidemics of modern times.  In 2018 alone, we saw 812.67 million instances of malware infection. Meanwhile, 2020 brought with it…

SolarWinds Hackers are Back At It and Targeting the IT Supply Chain

You may remember hearing or seeing something on the SolarWinds hack last year. The hacking group behind the SolarWinds attack is named Nobelium or Cozy Bear. This time around, they are targeting dozens of companies across the global IT supply chain. Nobelium is attacking technology providers and resellers that are helping their customers with their…

What is Ransomware and Why You Should be Aware of It

Gaining popularity and becoming a more common occurrence is Ransomeware attacks. We can already hear you asking, “what is Ransomware?” To answer your question, Kaspersky defines Ransomeware as: “Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid for your system to work again. This class of malware is a…