Blog
Actionable Tips for Growing Boston Firms
Are the Apps on Your Device Safe?
It’s difficult to judge whether or not an app can expose your business to risk without first downloading it. Despite their best efforts, Google Play and the iTunes store can’t possibly identify every single malicious application out there. Unfortunately, you’re...
Tech Term: Understanding Encryption
With data security becoming paramount for almost everyone, encryption is one of the more important technology terms you will need to know. Since data security has to be a priority--not just for your business--but for you, understanding what encryption is, and how its...
Cisco Bug Ranks as One of the Worst
A new exploit is making the rounds in the security environment, and this time, it affects virtual private networks. According to Cisco, the flaw affects its Adaptive Security Appliance (ASA) tool, and it should be patched as quickly as possible. If you don’t do so,...
A Brief Dive into Digital Signatures
Think for a minute the power a signature has. Signatures have started and ended wars, they have committed whole nations of people to rule of law, and they are attached to birth and death. For the individual, the signature is one of the most powerful possessions. You...