Tired of having to remember and manually enter extension numbers when dialing from your smart phone? It is possible now to have your cell phone automatically dial extension numbers for you. Follow the steps below (for your operating system) to modify your contacts to...
“An awareness and training program is crucial in that it is the vehicle for disseminating information that users, including managers, need in order to do their jobs. In the case of an IT security program, it is the vehicle to be used to communicate security...
When buying a new laptop or tablet for a specific business use case; there are a few questions that should be asked of an end-user before a machine is purchased. The first question or consideration is what we would call “machine class”. As laptops are...
I was recently contacted (via an online platform) by a person I had known for close to 30 years. He was telling me about a HUD program where citizens could apply to receive cash (up to 150,000), and were not obligated to pay it back. I was puzzled as on the one hand...
By now most everyone has heard about one or more of the data breeches that have occurred at Adobe, Equifax, LinkedIn, Stratfor, and others. In many cases, after a company has it’s data compromised, the data often makes it onto the ‘dark’ web where it...
Deadly Dolls and Killer Cars: 5 Internet of Things Attacks by Calyptix. August 9th, 2017 It’s no secret: millions of IoT (Internet of Things) devices have terrible security. Yet people continue to buy them and they continue to surface in cyberattacks. But does...