What is a pop-up and how can I get rid of them? Most people know what a pop-up ad is, but even if you have never heard of one before their description is in the name! And they are just as annoying as they sound... They are advertisements that with ... Cybersecurity Malware Tech Tips Jun 22, 2018
What is a Rootkit? A Rootkit is a piece of malicious software that hides itself on your computer and gives an unauthorized person control of the machine and access to the information on it. It goes without saying that t... Cybersecurity Malware Jun 15, 2018
Spam Emails and Getting Rid of Them Email spam, also known as junk, refers to all the unsolicited emails you receive and do not want to deal with (usually because they contain malicious links or viruses.) These shady emails are the ones... Cybersecurity Malware Jun 1, 2018
The Different Types of Malware What is Malware? Malware is short for malicious software and comes in many different forms. While some may believe that its purpose is to slow down or make a computer unusable, in reality that's only ... Cybersecurity Malware May 25, 2018
Online Gaming Risks and Warnings The dangers of the internet for kids has been known for practically three decades. Given all the tech advancements since then, that seems like a very long time. So why are we still facing online gamin... Cybersecurity May 4, 2018
Cloud-to-Cloud Backup - Safer, smarter and more secure Small Businesses Are at the Front Lines in an Almost Constant Attack of Hackers. These Companies Cannot Afford Downtime. As we move into the information era, data becomes a foundational element of bus... Business Continuity Cybersecurity Apr 27, 2018
What if everything you do was being watched? When you are on a computer, especially your personal one, you would expect a certain amount of privacy when it comes to passwords, bank info, and where the gold you buried three years ago is located. ... Cybersecurity Malware Apr 13, 2018
What is Air-Gapped Security? Now this is some seriously sci-fi stuff... But we can start at the beginning. There was a time not too long ago where there was a sure, fool-proof way to secure your servers, computers and even entire... Cybersecurity Apr 6, 2018
The Ultimate Disaster Recovery Checklist Stay One Step Ahead of Potential Disasters Prepare yourself before disaster strikes. When it comes to data backup and disaster recovery (BDR), being prepared for potential disasters is key to keep you... Business Continuity Cybersecurity Mar 30, 2018
Trojans and Adware, the Vessels of Malware Acting as a carrier for more harmful forms of malware ( learn more about what that is here⦠), both Trojans and Adware set out to accomplish the same goal and each goes about this task in its own uniq... Cybersecurity Malware Mar 23, 2018
Internet Safety for Children Technology is becoming more accessible every day. Our children have grown quite accustom to using gadgets that grant them access to the internet. Most parents may feel this is not a significant concep... Cybersecurity Mar 16, 2018
Computer Viruses, The Most Notable Malware 'Virus' is the most universal term for malware or odd computer issues. They are often blamed for even the most mundane computer problems; however, they are not always to blame. Many of the side effect... Cybersecurity Malware Mar 9, 2018