How Phishing Could Happen to Anyone

October 26, 2017

Working in the tech industry can give you a false sense of security about your security. Phishing emails are a regular occurrence in our line of work, and most are so obvious they don’t warrant a second thought. But phishing emails have grown more sophisticated as internet users have become more aware, and it only takes […]

Read the full article

How Google is Working to Secure Technology

April 24, 2017

They have been called “the defenders of the Internet”: the team of elite hackers hired by Google to find and report zero-day security vulnerabilities – those security flaws that have no known patch or fix, those flaws that are favored by hackers seeking user exploitation. They are the team responsible for finding the Microsoft “Edge/IE” bug, Apple’s […]

Read the full article

Security in the Age of the IoT

April 3, 2017

In 2016, Gartner estimated that 6.4 Billion connected devices would be in use. Plugging all aspects of daily life into the Internet is no longer hypothetical – it is happening on a massive and global scale. But with the Internet of Things (IoT) comes glaring security issues that have yet to be fully addressed. These […]

Read the full article

The Truth About Healthcare Cybersecurity

February 7, 2017

From 2015 to 2016, our country saw the number of Healthcare Cybersecurity breaches double. Since then, security breaches across all fields have continuously been on the rise, with 2017 ushering in some of the largest identity theft hacks in history. No one likes to hear that any personal information has been compromised, but it gets […]

Read the full article

Cyber Security: Online Crime Trends You Should Know About

October 25, 2016

This may be the first U.S. presidential election in history where cyber security has been a point of debate. Hillary Clinton used personal servers for government business, while Donald Trump’s corporate web servers were not secure. Politics aside, this drives home the point that cyber security experts have been making for many years: cyber security […]

Read the full article

How to Ensure Credit Card Reader Consumer Safety

May 31, 2016

Anyone that has worked in the realm of retail surely knows that Point of Sale (POS) systems and credit card reader use have been a hot target for attacks, hacks and other malevolent behavior. After all, the information gathered during the typical retail transaction consists of much more than just dollar amounts and SKU codes. […]

Read the full article
Modis