Citrix said the FBI warned them on Wednesday, March 6th that hackers compromised its IT systems and stole “business documents.” Citrix doesn’t know precisely which documents the hackers obtained nor how they got in. It’s suspected that this is a sophisticated cyber espionage campaign supported by a nation-state. The consequences of the Citrix security incident could affect a broader range of targets, as the company holds sensitive data for

Have you seen a new application — Chromium — suddenly appear on your computer? It’s likely that if you did not intentionally download it, the app is malware that should be removed immediately. While Chromium is a legitimate product, hackers have been using it to deliver adware and potentially unwanted programs, redirect browsers to different

Daylight Saving Time for 2019 starts on Sunday, March 10th. I’m sure you know how Daylight Saving Time (DST) works, but did you know not everyone in the US observes this time change? Arizona hasn’t observed DST since 1967, and Hawaii has never used DST. Michigan skipped DST from 1969 – 1973, while Florida is

Many companies password protect their files and applications and for good reason. There are hackers trying every day to break into a system and obtain files and information. Most businesses are smart about applying passwords to protect their information. However, many of them fail to think about sharing them within the organization. Anything can happen

Each year, around 61% of small businesses become the victims of a malware attack. While many small businesses may think no one would ever come after them because of their size, know that over half of the total global attacks hit small businesses and, for thieves, getting access to your systems is becoming increasingly lucrative. We’re collecting

Depending on their scope and impact on your workday, tech issues can take hours to resolve, if not days. In some cases, you may spend far too much time tracking down a problem, only to come up empty-handed in the end. In others, such as security breaches, you may not even know there is an

Book A Consultation With A Cybersecurity Expert