Fighting Phishing: How to Spot Email Scams

Each day your inboxes are flooded with email after email, some from people you know, others from companies of which you are familiar. Some emails that make their way into your inbox are typical and expected, while others are so outlandish that they would be foolish to even think twice about. A free trip to […]

How to Secure Your Database

Having secure information and databases becomes increasingly important the more and more we rely on technology for business operations —  especially in the business and healthcare fields, which store massive amounts of information using databases. A database usually holds sensitive information such as patient records, financial records, and so on, and because sensitive information is […]

Symantec’s 2016 Internet Security Threat Report

Internet security threats change, rise, and get more sophisticated each year, leaving internet users — from personal to business — vulnerable to a wide array of cyber attacks. It’s hard to keep up with, but thanks to Symantec’s Internet Security Threat Report (ISTR), we have a yearly overview and analysis of what to look out […]

What is Malware? Malware 101

Malware is a shorthand and umbrella term that describes all malicious software — or any software program that intentionally acts against the requirements of the computer user. Because of its umbrella-like designation, malware also refers to pretty much any form of hostile or intrusive software, including: computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, […]