Proud To Be A Veteran Owned Christian Company

4 different types of malware: explained

Over the decades of the internet’s existence, cyber threats have evolved at a rapid pace. When once there were only viruses and malware to watch out for, now you have to protect your business from worms, trojans, ransomware and dozens of other online threats. But what’s the difference between all of them? Let’s take a …

Google Drive just got a lot safer

Information security is on everyone’s mind – all too often we hear of a high-profile data breach in the news, and even the smaller scale attacks that don’t make headlines can wreak havoc on growing businesses. So it’s heartening to know that Google places a high premium on security. Their latest move to bolster protection …

Make iPhone text messages more private

Whether you’re a business owner, managing director, IT manager or senior staff member, everyone can benefit from additional privacy from time to time. And in our increasingly interconnected culture and media-saturated environment, it’s becoming harder and harder to retain your much needed private sphere. So for all the iPhone users out there, we have three …

What you need to know about cloud security

While many IT providers often tout the revolutionary benefits of the cloud, very few address the security aspect of it. But the fact of the matter is that when you’re using a cloud service, you’re moving information out of your hands and into those of a third party. So doesn’t it make sense to take …