iPhone & iPad Users: Beware of Fake Shopping Apps

If you're doing your holiday shopping via app, use caution. A growing number of fraudulent shopping apps are showing up in Apple's App Store. Like many online scams, these apps attempt to mimic the real thing in an attempt to get you to enter your credit card data or other...

Do You Know Where Your Sensitive Documents Are?

No organization wants to see sensitive information walk out its doors, yet it happens with alarming frequency. According to a recent study by Accusoft, a provider of document and imaging software, 34 percent of IT managers say their organization "has had sensitive information compromised due to poor file management practices."...

Don’t Let Network Outages Bring Down Your Business

One of the risks of having business-critical cloud based applications or IP telephony is your internet connection going down. Most SMBs can only afford to lose access to email or other apps for a few minutes at a time, if at all. However, as many of us who have suffered...

12 Hardware and Software Vulnerabilities You Should Address Now

Hardware and software that live past their end-of-life dates pose serious risks to organizations. Find out which assets you should update, upgrade or replace ASAP. It's not a stretch to say that most organizations have at least some old hardware and software still in use. An old computer that's still...