Category: Featured
Pioneers in Tech: George Boole, Mathematician AND Innovator
You’ve heard of Boolean algebra and Boolean logic, and you know the Boolean system forms the basis for the modern digital computer. But you probably don’t know much about George Boole, the man himself, described as “one of the great...
Cybersecurity Threat Advisory: New VMware patches available
This week, VMware released three security patches for a critical authorization bypass vulnerability in the Workspace ONE Assist solution. The vulnerability could potentially allow remote attackers to bypass authentication and elevate their privileges within the system. The vulnerabilities are tracked as...
What to do when your website content doesn’t convert leads
You’ve designed your website following SEO best principles. Web traffic is up. And yet, the phones are silent. Tumbleweeds roll through your salespeople’s inboxes. What gives? It’s simple. Your website content development strategy isn’t primed for conversion.
Hackers prey on holiday MFA fatigue
Multifactor authentication (MFA) is the gold standard in offices around the world. We all know the drill: you use your username (often, and inadvisably, your email address) and, perhaps, as the password, the name of your first dog and the...
Cybersecurity skills gap continues to widen even as ranks swell
The (ISC)2 association of cybersecurity professionals estimates there are now 4.7 million cybersecurity professionals being employed around the world, making for an 11.1 percent increase year-over-year for a total of more than 464,000 additional jobs. At the same time, (ISC)2...
Tech Time Warp: From Odeo to Twttr to Twitter
As you ponder whether you’re willing pay $8 to $20 a month for a blue checkmark, it’s worth taking a minute to learn about the history of Twitter. The social network’s debut at SXSW 2007 is well known, but its...
The value of holiday shopping user training
Once the calendar turns to November, people begin eyeing the dwindling days until Christmas. And with that sandglass motion of the calendar comes shopping, much of it being online. Studies about shopping, work, and cybersecurity risks are not plentiful, but...
6 Cybersecurity conversation starters
For MSPs and VARs trying to expand the reach of their services with existing clients, initiating a cybersecurity conversation around the need for solutions and services can be challenging. This is often because clients believe that their cybersecurity needs are...