BLOG
Public WiFi is ubiquitous. Pretty much anywhere you go these days, you’re going to find a free network you can connect to. Stop in to grab some coffee, free WiFi. Grab lunch at the restaurant...
The FBI has recently shut down a particularly nefarious ad server called the AdGholas group, which used a new and innovative method of infecting computers and managed to avoid detection for several...
Video streaming services like Netflix, Amazon Prime, Hulu Plus, and others are becoming so ubiquitous that they’re a fixture in everyday life for tens of millions of people. Unfortunately, hackers...
So what do you do when you offer an unlimited data plan and people actually take you up on your offer? Well, if you’re Verizon, you start banning them. Currently, Verizon is offering an “unlimited”...
According to security company Infoblox, a staggering 83% of the networks they’ve studied contain some form of malicious activity. The news is as staggering as it is grim, but if there’s a silver...
The annual “Cost of a Data Breach” study has been released, and the results aren’t pretty or encouraging. Between 2013 and now, the total cost to a company hit by a data breach is a staggering $4...
System administrators have their hands full dealing with “Leap Seconds,” the extra second periodically added to the day by scientists working with UTC (Coordinated Universal Time), used by computer...
Do you consider yourself to be a power user, where computers are concerned? Do you have one or more members of your staff you’d put in that category? If the answer to either of those questions was...
If your company deals with protected health information, then you know what a maze of regulation HIPAA rules can be. The Federal government has recently signaled just how seriously they take data...