Blog Archive

CIPA Compliance – What does it mean?

Schools and libraries applying for E-rate technology funding discounts must be CIPA Compliant. CIPA stands for the Children’s Internet Protection Act and mandates that if an institution is receiving a discount for network and network-adjacent services, then it must develop a protocol for use of these services by minors. Further, CIPA stipulates that the public must be […]

How To See Stars In Google Search

By following these simple steps, you can make your website stand out from the crowd with shining star ratings in Google’s search results.   Have you ever tried searching for your own business on Google?  If your business has a website, you likely pay attention to the content on your site, the efficacy of your […]

What are Phishpoint attacks and how can I best protect against them?

What’s PhishPoint? Phishing attacks are attempts to get e-mail recipients to provide sensitive information that can be used by the sender, generally presented as the authority of some account or business. They request that recipients provide information that could be misused for some type of illegal practical gain of the sender. An example of this […]

Cloud Services: 53% Of Businesses Are Publicly Exposed

How Businesses Are Accidentally Exposing Cloud Services – Don’t Make The Same Mistakes There are countless hackers out there just waiting for your business to leave your data vulnerable. With the introduction of the cloud, you felt a bit more secure and slept slightly better at night – but now, it seems that was precisely […]

New Krack Hack Has Raised Major Concerns For Businesses Worldwide Update #1

A major WPA2 flaw is being utilized to compromise the online security of businesses and private users alike, with the potential for far-reaching consequences. Cybersecurity headlines on Monday, October 16th focused on a fundamental flaw that has been uncovered in Wi-Fi Protected Access II (WPA2). By exploiting this flaw, hackers that happen to be in close […]

Has Your Accounting Firm Taken The Right Steps To Secure Confidential Data?

As an accounting firm, you deal with sensitive, valuable financial data on a daily basis. The livelihood of your clientele is regularly accessed, updated, and managed through your IT, which is why cybercriminals work so hard to find ways to break into your system. Malware, adware, and spyware pose just as big a threat to […]

Exploring The Dark Net And Deep Web – What Are They, Really?

Though terms like the Dark Web and Deep Web are often used interchangeably, they aren’t the same place at all – read on to learn everything you need to know about both. The term Deep Web is used to describe any content that is not indexed by Google. These are typically not the disgusting, creepy […]

Legal IT: Will Machines Take Over The World?

This is what people sometimes say when you start talking about machine language and artificial intelligence. Though it’s true that a computer can perform long, complex mathematical computations, it could never understand a small boy’s love for a cute puppy. All those emotions that humans have, all those irrational beliefs – it might be hard […]

Beware of Hurricane Harvey Charity Scams

Why are there horrible people in this world? We don’t know. What we do know is that they’re out there: People so malicious and amoral that they would use a devastating hurricane, and the kind intentions of others, to score a quick buck for themselves. Andrew, Katrina, Matthew: Every time a hurricane hits a city, […]

Newly Discovered Security Flaws Put Windows Users at Serious Risk

  Microsoft Vulnerability Affects Most Recent Operating Systems Learn about two recently discovered vulnerabilities that could put your company’s computers and operations at risk and what Microsoft is doing to fix the issue. Two newly discovered security vulnerabilities could put Windows users at risk of attack if they do not download and install security patches […]