-

Five Must Have Features in a Business Continuity Plan
While business continuity plans should cover topics that extend beyond the realm of technology, it makes sense that technology naturally moves to the forefront when much of the focus of […]
-

CMMC Series: Tier Two Overview
This is the third week of our Cybersecurity Maturity Model Certification (CMMC) Series. You can find week one, which was a look at what’s happening with CMMC in 2022 here. […]
-

The 5G rollout and the concern over C-band has caused some airlines to cancel flights
Even though major carriers AT&T and Verizon scaled back their 5G rollout scheduled for yesterday, some flights were cancelled or rerouted anyways due to the concerns that 5G could cause […]
-

CMMC Series: Tier One Overview
Last week we covered a general overview of what the Cybersecurity Maturity Model Certification (CMMC) program is and what’s been announced for 2022 so far. Presently, there are five maturity […]
-

Norton’s Antivirus Software Comes with a Crypto Miner, and They’re Not Alone
Last week a claim unfolded on Twitter that Norton was installing crypto mining software without authorization on PC’s which then rose to the level of outrage amongst some Norton antivirus […]
-

CMMC Series: What’s Happening in 2022
We’ve touched on the Cybersecurity Maturity Model Certification (CMMC) before in this blog, but over the next five weeks we’ll be doing a deep dive into this particular cybersecurity framework […]
-

New Year, New Bugs – The Y2K22 Bug Crippling Exchange Servers
We hope everyone had a wonderful New Year but unfortunately for those with 2016/2019 Exchange servers, the turning of the clocks to 01/01/2022 led to an unpleasant bug. Computer bugs […]
-

LastPass say they didn’t leak your password, however some users still received alarming alerts
Yesterday, a number of LastPass users received alarming alerts in their email inbox that their passwords – including their master password – had been compromised. The news quickly spread across […]
-

High Tech Holidays – Five Ways Technology Can Make Your Holiday Season Easier
We’re right in the middle of the holiday season right now, and we thought the best gift we could give to you (our readers) is some advice straight from the […]
-

If you’ve never heard of the Log4J vulnerability, you’re probably at risk
News is moving fast on the Log4J vulnerability, also known as “Log4shell”. It was first discovered in the video game Minecraft, developers realized hackers could exploit the vulnerability to gain […]
