By now most of us know a significant amount of information is being gathered about us every time we browse the web.
You may have seen articles about the Internet of Things or references to IoT, but do you really know what this means?
Do you hate waiting in line as much as we do?
If not, today is the day to get started. The steps we recommend are a bit time consuming, but necessary. Also, there are many things to consider and likely numerous people in your immediate family for whom these steps will need to be taken.
It has been a number of weeks since a major flaw was reported in what is called the Wi-Fi Protected Access (WPA) protocol and we have been monitoring the tech blogs to see how this would shake out. Let’s address the protocol and the roll it likely plays in your life.
Defending your systems against malicious threats is best handled by layered protection. We are now offering another layer with a best-in-class Web Protection service that will keep your users safe and productive. It complements traditional antivirus engines and firewalls by letting you define your own content-filtering policies, website blacklists, time-based and content-based browsing policies, and much more.
This service is immediately available! Contact us today to discuss pricing and a roll-out strategy for your team.
I think we have all witnessed smartphone addiction in our lives. It could be at the hands of friends, family, or even yourself.
Two-Factor authentication (2FA) is available on most major services; think Gmail, Facebook, Twitter, etc. But what is it?