Beware of Cryptolocker

Imagine you are on your personal or work computer, and you receive a seemingly innocuous email from a trusted source, such as your bank, your tax office, or even a friend. The source asks you to download a file to update important account information. But, when you...

FCC Approves Net Neutrality Rules

After a landmark vote on February 26, The Federal Communications Commission officially classified Internet providers as public utilities. The new net neutrality rules were approved 3 to 2 among party lines. The rules ban high-speed Internet providers, such as Verizon,...

Bandwidth Bottleneck Coming to an End?

It is predicted that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force, who use their mobile devices and tablets for both work and play. All of...

The Growing Importance of Mobile Security

According to a report by CompTia, 28% of businesses view security as a significantly higher priority today compared to two years ago, and an even greater percentage of businesses expect the importance of security to rise in the next two years. The study also revealed...

Is Cloud Computing Secure?

In the early days of Cloud computing, the common perception was that the Cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed they were sacrificing security for the business...