Recently, there was a major vulnerability detected within CloudFlare’s servers that journalists have affectionately named, “Cloudbleed.” This vulnerability was exploited to obtain over a million usernames and passwords, marking it as a pretty major problem. This is where Project… Read More
Blog
Have You Heard About How Amazon Broke the Internet?
As an internet user, you have probably noticed some recent issues with popular websites like Pinterest and Gizmodo. Even Down Detector itself went down during the chaos. The problem originated with Amazon Web Services and the effects were pretty… Read More
Are Cloud Solutions Right For Your Company?
The Cloud seems to be a hot topic of late. Companies both big and small are looking into Cloud Computing and the server solutions that it can provide. If you’re someone who has been wondering about The Cloud and… Read More
Make Sure You’re Staying Safe from Phishing Attacks During Holidays
Valentine’s Day was this week, but it wasn’t all heart-shaped pizzas and flowers. Holidays are always popular times for hackers and other malicious individuals to plan attacks; phishing attacks are especially prominent during these times. After all, holidays are… Read More
BYOD: Advantageous or Disastrous for Your Cybersecurity?
Some companies insist the BYOD or, Bring Your Own Device programs are highly advantageous for the enterprise. The question we will be addressing today is the potential threats to your cybersecurity when you implement a BYOD program in your… Read More
What is the Difference Between HTTPS and HTTP and Does it Matter?
When you shop or do your banking online, how do you know that your information is safe? Without knowing the ins and outs of how the internet works, you may feel like you’re shouting sensitive information in a public… Read More
Strengthening the Work of Others is How You Grow Stronger
Creating and maintaining a company is hard, but utilizing the expertise of Jim Collins can help you achieve a success you’ve only dreamed of. One of the first things you need to ask yourself is what success is in… Read More
The Sinister Rise of Ransomware Attacks
Ransomware is a type of malware that holds your computer, and the files within for ransom. These attacks can be challenging to work through and they are becoming more and more sophisticated as time goes on. The sinister rise… Read More
Understanding Level 5 Leadership with Jim Collins
Though you may be following our blogs for tips on how you can keep your network safe from hackers and malware, we invite you to take a slightly different journey with us today. Inspired by the words of Jim… Read More
Find Out How Malware is Spreading Through WhatsApp
There are many different kinds of messaging services available to the masses. Skype, Facebook Messenger, Google Hangouts and others have all had their share of malware related problems. This time, it’s WhatsApp’s turn. WhatsApp is a very popular messaging… Read More