“OMG! My email is hacked!” This is a true account of an email hack we’ve just witnessed and helped a client through. It all started with one of our client’s bank account manager calling our client (will call him Bob in this email): Bank: Bob, Happy New Year! We have received an email from your […]
The enterprise tech-focused weekly podcast This Week in Enterprise Tech had it’s first question and answer episode this week, and it was absolutely fascinating, as they dedicated the entire podcast to answering listeners/viewers’ burning questions about business technology.
Facebook’s active-user count is rapidly approaching one billion. The world’s largest social network, which has long been a popular target and platform for attackers, will only become a more relevant outlet for scams and other fraud as it continues to grow. While the target grows, so too does the need to secure our accounts. Kaspersky […]
It is estimated that more than a billion computers are at serious risk of a new Java exploit discovered by researcher Adam Gowdiak. Oracle chose not to include a patch for this critical vulnerability in its October 2012 update, but has planned to release a patch in February of 2013. In the mean time, Nerds […]
This infographic is courtesy of Lifelock via SocialMonsters.org.
As is common for many Canadians, I frequent Tim Horton’s for coffee and meetings. Recently, they’ve started offering free WiFi at many of their locations which is obviously very attractive for business as well as travelers, especially tourists who want to avoid roaming charges on their smartphones. However, as you can tell by these screenshots, […]
“We have met the enemy, and he is us!” declares Pogo in his comic strip. The same applies to cloud security. The biggest cloud security problems are not with the data center – they’re with the cloud in our pocket.” says Simon Crosby, founder of XenSource and now Bromium, a stealth start-up company that seeks […]
How much do you really understand your network? Do you know what kind of data and how much of it is traveling across your network and to the internet during peak periods? Is your network truly protected from all potential threats? These are the kind of questions you or your I.T. people should be asking. […]
When you first get a computer or laptop, most security settings in Windows are set at their default settings, which are usually not ideal, and in some cases downright frustrating when you want to view certain web pages, or even download things.