Ransomware! – It’s here to stay…
“My firm WILL be affected by ransomware.” If you intone that rather gloomy mantra to yourself every morning before you go to work, you might
“My firm WILL be affected by ransomware.” If you intone that rather gloomy mantra to yourself every morning before you go to work, you might
Extortion is not usually a topic that employers have on their radar regarding their employees. Most employers know they need to protect themselves against viruses, and
Update: As of Thursday, August 6th, 2015, Google and some phone carriers are pushing out a security fix to address this vulnerability. Source: http://www.zdnet.com/article/after-stagefright-samsung-and-lg-join-google-with-monthly-android-patches/ What is
It doesn’t matter if you’ve trained them or yelled at them or had to fix their infected computers in front of them (or all of
We field questions about Java security issues on a regular basis, and have noticed that users are often confused about the differences between Java and
Even though you CAN buy it, you need to ask yourself if you really SHOULD you buy that Internet-connected appliance…….. Very few people would seriously
Remote access is often one of the weakest points we find in a customer’s network. Corporations allow home users, with no real security on their
It’s official, all major SSL stacks are now vulnerable. There are already a number of detailed blogs written about this new vulnerability, so I am
What Is The HIPAA Privacy Rule? Accoprding to HHS.gov, “The HIPAA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health
1420 NW Vivion Road, STE 102
Kansas City, MO 64118
3000 Riverchase Galleria, STE 700
Birmingham, AL 35244