Security

Opus 111 Group Cyber Security Discussion

With the expanding platform of the Internet, the rate of fraud and breaches have dramatically increased as its access eases. Fortunately, the joint forces of Opus 111’s Jim Harvey and Emerald City Solutions’ Grant Eckstorm provide the appropriate steps to take prior, during, and after an in ...

Continue reading

Are the Messaging Apps You Use Secure?

Messaging applications are critical to the success of the modern business, but it’s important that they don’t compromise security in the pursuit of convenience. There is a specific set of criteria involved with ensuring that your chosen messaging applications are secure. The Criteria Ask yoursel ...

Continue reading

500 Million Users Exposed by Marriott

2018 has been the year of the hack. The problem, so was 2017, 2016, and so on… Marriott International has announced that they have had what could be the second largest data leak in history. They are saying that they are responsible for a data breach that leaked some 500 million records over a five ...

Continue reading

Powerful Physical Security Options

Data security isn’t the easiest thing in the world to plan for, especially if your organization doesn’t have any dedicated security professionals on-hand. While protecting your data with traditional methods, like passwords, firewalls, and antivirus, is important, what measures are you taking to ...

Continue reading

Spreading Botnet has Years-Old Flaw to Thank

When asked how one can prevent threats from attacking a business’ infrastructure, one of the first answers that we’d give is to ensure that all patches have been applied. Doing so will help to stop an attack from infecting your systems if a patch has been successfully developed. Unfortunately, t ...

Continue reading

Protect More Than Digital Assets with a Managed Service Provider

When you think about your data security, what kind of solutions pop into mind? If you’re like many, you probably start thinking about passwords, firewalls, and antivirus, right? While these are all good things to have, you also have to consider the possibility that someone could break into your of ...

Continue reading

Cybersecurity Can’t Stop During the Holidays

This Christmas, technology is everywhere. Traditionally, the holidays were a time when things slowed down for businesses and people spent time with their families and put their work on the back burner. Those days are over. Today’s professional is lucky to get a day off for Christmas; and, because ...

Continue reading

One Phish, Two Phish, The Grinch Who Didn’t Phish

An email’s important, that much is clear fact - but you need to stay safe from an email attack. There’s so many threats, and with attackers so busy how can you stop them all without getting dizzy? To answer this question, we look to one Who, who smartly saved Christmas from disaster, part two! ...

Continue reading

It’s Decided: You’re More Likely to be Phished than Breached

Few security problems are more dangerous than a network breach. Considering how much you could lose from an unexpected bout with a hacker, it’s no surprise that businesses are concerned. Yet, even some of the most troublesome threats like phishing attacks are often ignored. A new study introduces ...

Continue reading

Securing Your Google Account: The Unofficial Guide

If you use a computer today, there’s a fair chance that you have a Google account. The practicality that if offers with its comprehensive service offerings simply can’t be ignored. However, it is also important that a user’s, whether they utilize it for business or personal use, security isn ...

Continue reading

Search Blogs

Subscribe to Our Blog

Ready to Talk?