Securing Office 365 with a Second Layer of Protection 

Office 365 has turned out to be a revolutionary product for Microsoft. By subscribing to the complete suite of Office productivity tools in the cloud, organizations of all types and sizes can:

The Value of Knowing Your School's Security Weaknesses

Many schools in California are rolling out “one-to-one” computing initiatives, to supplement existing policies of bring your own device (BYOD) programs to advance digital curriculum in K-12.

Don't Get Uber-ed: Security Threat Monitoring for the Rest of Us

Last week, ride-sharing company Uber became the latest high profile corporation to disclose that they were victims of a massive hacking. They're now part of an embarrassing list of name brand companies like HBO, Yahoo, and Experian who were victims of breaches this year.

When It Comes to Data Breaches, Your Best Employees May Be Your Biggest Risk

Our clients tell us they're concerned about network security. So are we.

Five years ago, Forrester reported that most data breaches affecting small and medium sized businesses were the result of internal vulnerabilities. By 2015, the threat landscape had changed so much that the SEC issued a warning:

Network Security: Malware Will Continue to Multiply Like Bad Rabbits

The editors at ZDNet have proclaimed 2017 The Year of Ransomware, and no wonder. Our network security news feeds this year have been full of warnings about malware variants with names like Petya, NotPetya, WannaCry - and last month's outbreak, which was dubbed Bad Rabbit.