Tech Blog
16777
paged,page-template,page-template-blog-masonry,page-template-blog-masonry-php,page,page-id-16777,paged-2,page-paged-2,bridge-core-2.1.3,ajax_fade,page_not_loaded,,qode-theme-ver-20.0,qode-theme-bridge,disabled_footer_top,qode_header_in_grid,wpb-js-composer js-comp-ver-6.1,vc_responsive

Tech Blog

Major announcement reveals a critical flaw in Apple's operating system. From The Verge: There’s a major flaw in Apple’s macOS High Sierra operating system that allows anyone with physical access to a Mac to gain system administrator...

17 minute video on Cybercrime explains how easy it is for criminals to access your information: Just by uploading a photo from your phone someone can tell where you've (possibly where you live) been...

Effective Cyber Security Strategy Your organization’s response to a cyber-incident should be guided by a plan that limits damage, reduces data recovery time and costs, and increases stakeholder confidence. This response plan should be accessible to key...