Blog

Re-secure your passwords!

A password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use today -- the combination of letters, capitalizations, and numbers -- NIST admits that the existing guidelines were misguided.

Cloud-hosted vs. On-premises VoIP

The cloud has become the infrastructure of choice for many business owners. For others, premise-based infrastructures are still favored. So when it comes to VoIP phone systems, which infrastructure is best for your business?

Installation and maintenance

On-premises VoIP phone systems are installed at your company’s office, typically managed and maintained by your own personnel.

Who are the ShadowBrokers?

Another Windows security vulnerability has been released, and it looks as though it will be only a few weeks before the next one arrives. How do we know this? Because a group of hackers are openly selling their secrets to whoever will pay. Read on to learn how to protect yourself from this dangerous group of cyber criminals.

What you can learn from Equifax’s leak

What would you do right now if you discover that your business’s database is hacked and a huge number of your customers’ data gets leaked? Speechless, with dismay, but you need to act, decently. In this case, it helps to have a good incident response plan in place, so your business won’t suffer the same fate as Equifax, which is an interesting story we’re about to tell.

Beware of healthcare IoT security risks

The general rule of thumb of cybersecurity is: Anything that connects to the internet can be hacked. With the increasing popularity of Internet of Things (IoT) in the workplace, every business should be on high alert, especially those in the healthcare industry where patients' well-being hinge on the security of the device.