Third-Party Application Security

Third-Party Application Security

2014 was a big year for security breaches. Sony, Target, Home Depot, and even Goodwill were severely compromised, leaking an unknown amount of customer information and critical corporate data, some of which being exploited using weak passwords, unpatched Windows...

Secure your web traffic; Why HTTPS is important

There are many ways to transmit information over the Internet from one place to another and all different systems use all different mechanisms and protocols to transmit data from point A to point B. Some are secure and some are less secure (or usually not at all). In...
Ransomware and Your Business

Ransomware and Your Business

Believed to first have been identified in 2013, there’s a new kind of malicious threat floating around the web that continues to pose a risk to business data: ransomware. Ransomware is a type of malicious application that uses common attack vectors (phishing...
Securing Your Wireless Network Round 1

Securing Your Wireless Network Round 1

Wifi is everywhere these days. It’s rare to hear of a computer or device coming to market without wireless capabilities that make networking with other home or business assets a breeze. Wireless can also be great for extending network coverage to places that...