Smishing is the New Phishing!

Smishing is the New Phishing!

6 Tips to spot Smishing Just when we’ve gotten more savvy at recognizing phishing in our email, along comes smishing. You’ve probably already been confronted by this on your phone. Increasingly, cybercriminals are using text messaging (SMS -> SMiShing) to defraud...

Don’t dismiss disaster recovery for 2017

Over the previous months, you’ve probably heard about new and disruptive trends like virtual assistants, smartphones, and automation technologies. Some of these IT solutions may even be placed on top of your business priority list. However, with floods, fires, and...

Managed services for cyber security

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave...

Chrome and Safari: hackers’ newest tools

Filling out web forms often seems like an unbearably monotonous obstacle that gets in the way of online shopping, booking a plane ticket, and doing other types of online registration. With many of today’s transactions done online, people have become accustomed to...

G Suite or Office 365?

With our busy schedules, we all could use more time to ourselves and loved ones. Getting back home in time for a real meal is now a luxury for many. Thanks to productivity tools like Google’s G Suite and Microsoft’s Office 365, we’re able to regain some of our lost...