Select Page
The Benefits and Risks of Cloud Computing

The Benefits and Risks of Cloud Computing

Opportunities, management strategies and more Cloud computing is here and virtually every organization is using it in some way, shape or form. Educating yourself and your people on the opportunities and risks associated with this technology is of the utmost...
Small Business a Huge Target for Hackers in 2017

Small Business a Huge Target for Hackers in 2017

2017 Ponemon Study: SMBs are Huge Target for Hackers: Negligent employees are the #1 root cause behind data breaches across North America and the UK Ransomware is hitting SMBs hard with more than 50% experiencing an attack Attacks are becoming costlier to businesses...
Why Every Leader Needs to Be Obsessed With Technology

Why Every Leader Needs to Be Obsessed With Technology

This article is part of a series exploring the skills leaders must learn to make the most ofrapid change in an increasingly disruptive world. The first article in the series, “How the Most Successful Leaders Will Thrive in an Exponential World,” broadly outlines four...
10 Technologies Poised to Change the Future

10 Technologies Poised to Change the Future

The MIT Technology Review has released its annual list of innovations that will have the largest impact on businesses and society in the coming years. The list is expansive covering industries including healthcare, renewable energy, self-driving vehicles, new forms of...
Small Businesses Lag in Cyber Security Readiness

Small Businesses Lag in Cyber Security Readiness

Small businesses are lagging behind larger companies in preparedness for attacks on their websites or computer systems. That’s the finding of a survey by Hiscox, an insurance company whose target market in the U.S. is small business. The survey released last...
The Black Market Value of Your Hacked PC

The Black Market Value of Your Hacked PC

By Brian Krebs, Security Researcher A few years back, when I was a reporter at The Washington Post, I put together a chart listing the various ways that miscreants can monetize hacked PCs. The project was designed to explain simply and visually to the sort of computer...