❰ Back to Blog

Fake security software: How to spot, protect against fraud

These days, hackers leverage all kinds of malicious tactics to infect users' computers and steal their valuable personal information. One approach that continues to pose a threat is the creation and dissemination of fake security software that purports to safeguard users, but is actually doing the opposite. These bogus pieces of software - that ...

What does the Internet of Things mean for enterprise security?

The ability to stay connected is one of the best parts about technology: It brings people together like never before. Now our desire for connectedness is being taken to the next level, with numerous devices being equipped with sensors and Wi-Fi. Baby monitors can send texts to a phone when the baby starts crying and refrigerators can send push not...

Have you protected your health care IT systems yet?

In the last two decades, the use of IP technology in health care has increased dramatically as hardware has become more portable and affordable. Within just the last few years, new programs and systems have been developed that allow doctors to greatly improve the standard of care patients receive and even cut down on the number of doctors visits ne...

Why first responder IT systems need to be made more reliable

When it comes to first responders being successful at their jobs, the first thing they need is to know where the emergency is. The 911 service is crucial to getting help to those who need it. But, just as with any technology, problems can arise unexpectedly. For example, Ohio residents experienced this first hand when a pipe burst in AT&T's Akr...