by Ethan Holmes | May 30, 2019 | Articles
Cybercriminals want one thing; information. After all, “information is power,” and what better way to get power than to steal sensitive information and hold it hostage? Ransomware is a common type of virus because it is highly profitable for cybercriminals. There are...
by Ethan Holmes | May 30, 2019 | Articles
By Ed Desorcy A record number of consumers and businesses are relying on a cloud backup model as their only form of data backup. Cloud backups offer seamless ease of use, fast deployment, scalability and low up-front costs, but how safe are they really? What is the...
by Ethan Holmes | May 15, 2019 | Articles
Many companies were started because someone asked an innocent question. The invention of the Polaroid Instamatic Camera was triggered by a question. The three-year-old daughter of the inventor, Edwin H. Land, asked her father after he took her photo, “Why do we have...
by Ethan Holmes | May 3, 2019 | Articles
Written by Ed Desorcy As we’ve highlighted in our Scam School articles, phishing is one of the most common and successful attacks out there. Phishing is described as someone with malicious intent requesting a piece of information through email from a victim under the...
by Ethan Holmes | Apr 17, 2019 | Articles
James O’Toole, a professor and leadership expert once said, “95% of American managers today say the right thing … 5% actually do it.” On every front, poor leadership is destroying companies. Unnecessary turnover of employees and disengaged employees,...
by Ethan Holmes | Apr 9, 2019 | Articles
By Ed Desorcy If you’ve been keeping up with our Scam School articles, you might be familiar with the term phishing, and the increasing threat it poses to businesses and consumers alike. Phishing can be described as the act of asking a target for a piece of...