
Another Breach… How Safe is our Data?
As we have seen in the news in recent weeks, foreign powers have exploited a well known IT vendor in order to gain access to IT equipment. This is frightening...
Password Not Required: Better Security with Less Friction
Everyone knows the frustration of passwords. Creating passwords, resetting them and administering them is a time-consuming process, and 59% of people use the same password everywhere. Passwords change too frequently,…
Federal Ban on Certain Surveillance Cameras: What Does It Mean?
The National Defense Authorization Act for Fiscal Year 2019 recently went into effect, after being passed by the US Senate on August 1st, 2019. What’s unique about this year’s NDAA…
End of Days: Windows 7 and Server 2008 Head Off into the Sunset…
All good things must end, and PC operating systems are no exception. One of the most popular versions in Microsoft’s history for consumers, Windows 7, is calling it quits after…
Essential Steps to Network Architecture
Everyone has seen security checkpoints at the airport. They ensure that only those people who belong at the gate can reach them, and also that there are no bad actors…
Information Technology Then and Now
Looking back, 1995 was a pretty big year in IT. Almost 40 million people had Internet access, and that new email thing was catching on. The World Wide Web was…
Setup for Success: IT Security for Everyone
The consequences of malware, phishing attempts and breaches are known to be common amongst household name corporations in our times. Credit bureaus, video streaming and gaming console breaches as just…