Blog

Does the CIA have access to your router?

There are an exhausting number of cyber security threats to watch out for, and unfortunately you need to add another to the list. A recent leak from the CIA proves that routers are one of the weakest links in network security.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

Apple focuses on enterprise users with iOS 11

Businesses were quick to adopt Apple’s iPad in the workplace since its release in 2010. It didn’t take long for it to become one of the most popular Apple devices, even though many users regarded it as just an oversized iPhone. All that changed with the release of the iPad Pro, which Apple is positioning as a practical replacement for the PC or Mac.

Mobile security threats in Android

Employees today are working under tight timelines, but thanks to bring your own device policies (BYOD), they can access critical files and applications using their mobile device and get work done from anywhere. But BYOD can be a double-edged sword to those not vigilant about cyber attacks.

Gmail gets anti-phishing enhancements

Although hackers continue to develop new viruses and bug exploits, the most effective weapon in their arsenal is a simple email. All a would-be cybercriminal has to do is write a convincing message (or pretend to be a trustworthy entity) to persuade a victim to download a malware-ridden file or surrender their personal information.

Using Pinterest to market your SMB

Many small- and medium-sized businesses are abandoning traditional marketing methods in favor of social media platforms, and for good reason. Take Pinterest, for example, whose latest product “DIY Promoted Pins” allows businesses to promote their Pins to increase click-throughs, improve reach, and potentially drive more website traffic.