Small businesses are increasingly moving from traditional telephones to Voice over Internet Protocol (VoIP) to save on costs. While VoIP offers many benefits, an unsecure system can leave your business vulnerable to a new kind of attack called telephony denial-of-service (TDoS). In this blog post, we will discuss what TDoS is and how you can protect your VoIP system and your business against it.
There’s a new augmented reality game on the market these days. Perhaps you’ve heard of it – a title called Pokemon Go, which lets you capture virtual monsters that “appear” on your smartphone’s camera. However, hackers have seized this opportunity to infect players’ mobile devices with a backdoor called Droid Jack, which uses the mobile app’s […]
Thanks to the advancements of virtualization and cloud computing, many businesses are hosting key parts of their IT infrastructure off-site. While this move is great for mobility and productivity, it makes operations extremely dependent upon a working Internet connection. If this scenario describes your organization, what’s your plan to stay productive should your Internet connection […]