How Much Cell Phone Data Privacy Should We Expect?

How Much Cell Phone Data Privacy Should We Expect?

According to the Pew Research Center, more than 96% of Americans own a cell phone. Among people ages 18 to...
Read More
Teaching Cybersecurity to Kids

Teaching Cybersecurity to Kids

As people who grew up without cell phones, tablets, and computers, today’s parents have — at least generally speaking —...
Read More
Logic Bombs: How to Prevent Them

Logic Bombs: How to Prevent Them

A logic bomb is a piece of malicious code that hackers insert into a software or operating system. This code...
Read More
Steps Businesses Must Take to Prevent Data Breaches

Steps Businesses Must Take to Prevent Data Breaches

Cyber-attacks are not something to take lightly as a business. In fact, they can be detrimental to your finances and...
Read More
Business Solutions That Are More Secure in the Cloud

Business Solutions That Are More Secure in the Cloud

One of the big decisions company owners must make is whether to use cloud-based or on-premises business solutions. Here are...
Read More

{Latest Posts}

A man in a suite stands with an umbrella as binary code rains down. The photo is a metaphor for Cybersecurity Insurance.

Cybersecurity Insurance

The number of data breaches are constantly on the uprise, and they are costly. Business owners are taking preventative and proactive measures to secure and implement best cybersecurity practices. There is a virtually new…

Read More »
Switch button positioned on the word maximum black background and red light. Conceptual image for illustration of high level of risk management.

Risk Management

In 2017, research has averaged the cost of a data breach to be over 7 million dollars. On average it takes an approximated 46 days to resolve a cyber-attack. Regardless of the numbers, it’s…

Read More »
Cyber man investigating data breach holds a magnifying glass up to his eye, man is made of pixels and abstract colors and code

Don’t Breach My Data

In this day and age, there’s always news reports of the latest big data breach. We had the HBO breach for the original series Game of Thrones, there was the Equifax breach, Target, and…

Read More »
Group of people working in an office SMB

SMB Best Practices in Security

Are you a small to medium size business owner (SMB)? Are you actively implementing cybersecurity best practices for your SMB? Many SMBs have a mindset that cyber-attacks won’t reign down on them. The “I…

Read More »