Narrow by

Find a Workshop near you:

Blog

COVID-19 Used in Malicious Campaigns

April 15, 2020

COVID-19 is being used in a variety of malicious campaigns including email spam, BEC, malware, ransomware, and malicious domains.

Blog

What You Need to Know About Stalkerware

March 18, 2020

Stalkerware, the use of monitoring software for stalking, represents an intrusion into your privacy and possible security concern for companies and customers.

Blog

Security 101: Protecting Wi-Fi Networks Against Hacking and Eavesdropping

February 19, 2020

Setting up small business networks is simple, but users may set up their devices heedlessly and consequently risk their data to unsecure networks.

Article

How to Choose the Right Small Business Accounting Software

Small business owners can easily manage their business finances by choosing the right small business accounting software to match the features they need. Read more

Blog

4 Things to Do If Your Email Account Gets Hacked

January 22, 2020

If a friend tells you that you’ve been sending them strange emails or spamming their social media pages with posts that you aren’t likely to send, you’re probably already aware what happened: your email account has been hacked.

Blog

Should You Track Your Employees Via GPS?

January 14, 2020,

GPS tracking employees is currently in force in the workplace, and its use is growing. Should your small business GPS track your workers?

Recorded Webinar

Technical Strategies for Your Non-Profit’s Success

December 10, 2019, 2:00pm EST

The 4 C’s for a non-profit’s success will be shared, specifically as it relates to finding a software solution that meets your needs. Read more

View Webinar
Blog

How to Stop Hackers from Getting Personal Data

October 30, 2019

In 2018, personal data breaches were among the top reported cybercrimes in 2018, with 50,642 victims. These amounted to losses over $148.8M.

Blog

Securing Social Media in Small Businesses

October 23, 2019

Social media use raises security and privacy risks for small businesses. Some threats include phishing and fake accounts. Learn how to protect your company.

Blog

Protecting Mobile Devices from Fake Apps

October 16, 2019

Delivering adware through mobile devices enables cybercriminals to monetize affected devices while attempting to be innocuous.

Pages