Our browser is literally the window into our digital world. In the USA, Chrome has a 49% share and Safari has 35%.
The newest, fastest-growing tactic for cybercriminals is called Business Email Compromise (BEC).
NC just became the first state to enact a law prohibit some these ransomware payments
Almost everybody is familiar with anti-virus software. Norton and McAfee are big brand names in this space. This software is...
Electronic Office has spotted a new phishing technique. It’s a pop-up window that appears over the content on your computer...
Imagine that it is the day before the July 4th holiday. You get an email that appears to come from...
Protecting clients from cyberattacks is our most pressing responsibility. It requires a massive investment in talent and tools to provide...
A malicious cyber-attack that pulls down your system and blocks access to data is as much of a crisis as...
The pandemic accelerated trends towards working from remote locations more often and with more flexibility. Many business activities that require...
Cybersecurity for our businesses is a complicated blend of ongoing tasks. A strong security plan requires a blend of technology...
Last Friday, we were first informed about a security flaw within log4j, a java-based application logging tool used in perhaps 10,000+ applications. The...