Hurricane season in can be a stressful time, especially when these storms have a variety of projected paths and it’s tough to tell which direction it’s headed. Our best advice is to prepare for the worst and keep up with the current path of the storm. Here are some great uses for your mobile phones […]
Banks and companies that manage automated teller machines, better known as ATMs, have been warned against another method thieves have been utilizing to commit identity theft–by no less than the Secret Service. Machines in Connecticut and Pennsylvania have been found to have periscope skimmer devices attached inside, especially in those machines with openable lids that […]
Google has implemented a project to encourage assistance in collecting potential vulnerabilities for its Nexus line of mobile devices, with some considerable prizes associated with it. Called the Project Zero Prize contest, contestants must be able to hack into a Nexus 6P and a Nexus 5X with nothing but the phone numbers and associated email […]
The search for the perfect way to handle a data loss disaster has led many businesses to implement data backup and disaster recovery solutions, but the most challenging part of doing so is finding a solution that can minimize data loss and recovery time. Furthermore, there’s a specific need to understand the difference between data […]
There’s an ongoing debate concerning whether the United States Constitution gives the American government the right to access data held on electronic devices by its citizens. In case they didn’t make themselves heard clearly enough, the director of the FBI, James Comey, has released a statement at Symantec’s Annual Government Symposium. You might not like […]
After implementing their current infrastructure for almost a decade, the U.S. Department of Education have plans to upgrade, directing their attention toward ensuring that the new initiative keeps mobile capabilities as a high priority. The current infrastructure, EDUCATE (Education Department Utility for Communications, Applications, and Technology Environment) was the first to move away from an […]
Renowned tech company Intel has announced their next line of laptop processors, but an unfortunate aside caused significant frustration among the IT market. Intel has broken from the tradition of releasing new processors each September which will be improved upon later. Instead, Intel has jumped the gun and released a new processor, rather than improve […]
This Is Goodbye Internet Explorer Let’s begin the celebration! Microsoft recently announced all Internet Explorer versions 10 and lower will no longer be supported beginning January 12th, 2016. The announcement comes as Microsoft has began focusing on the company’s newest browser Edge. Microsoft is in the process of removing Internet Explorer on future PCs and […]
Company data breaches can be devastating to businesses. Many companies will close their doors within months of a data breach, depending on the nature of the business and what information was compromised. Once a data breach occurs, that damage is done and you can’t go back and stop it. However, you can take some preventive […]
No matter how large or small a business is, there’s a good chance that there is some valuable information on your mobile phone. If you use your mobile phone to look up financial documents or other personal information, that information is vulnerable to being compromised if your device is stolen. You never know when a […]