Email Security

Phishing Scams – How to Protect your Business

Posted date: July 28, 2017

What is a Phishing Scam? Phishing scams are typically fraudulent email messages appearing to come from legitimate enterprises in order to obtain sensitive information such as usernames, passwords, and credit card details and, indirectly, money. T ...

Read More »

Upgrade Business Technology to Prevent a Malware Attack

Posted date: February 11, 2016

  We often discuss malware attacks, hacking, vulnerability, viruses, and the list goes on. Cisco, a well-respected networking giant, recently released their annual report. The report contained statistics stating that only 54 percent of businesse ...

Read More »

Times Warner Cable Learns a Lesson in Data Security

Posted date: February 3, 2016

  In early January, Time Warner Cable Inc announced a possible data breach of up to 320,000 customer email passwords. This likely occurred through malware that was downloaded during phishing attacks, or indirectly through data breaches of other ...

Read More »

Is That Email a Phishing Scheme?

Posted date: October 20, 2015

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for ...

Read More »

Webinar: Kevin Mitnick-The World’s Most Famous Hacker

Posted date: June 16, 2015

Our email encryption partner, Zix, will be having a conversation about the inherent insecurity of email with the world’s most famous hacker, Kevin Mitnick, on June 17th, 2015. This notorious black hat turned white hat hacker will share thought- ...

Read More »

Webinar: Famous Hacker on Email Security

Posted date: June 10, 2015

Our email encryption partner, Zix, will be having a conversation about the inherent email security with the world’s most famous hacker, Kevin Mitnick, on June 17th, 2015. This notorious black hat turned white hat hacker will share thought-provo ...

Read More »

What Does It Take to Make a Secure Password?

Posted date: June 8, 2015

A secure password is vital for your safety.  Brute force solving is a method of password cracking that involves trying thousands of possible combinations of characters to find out what a specific password is.  Given the power of today’s supercomp ...

Read More »

Major Router Vulnerability Discovered

Posted date: May 26, 2015

According to Security Week and PC World, a serious router vulnerability to the NetUSB driver was discovered last week by researchers at SEC Consult.  The driver was developed by Taiwanese company KCodes, and this security flaw undermines the securit ...

Read More »

Bottom Line IT featuring Personnel World

Posted date: July 30, 2012

On this weeks Bottom Line IT show, Amy Mumby filled in for Matt Kolberg and co-hosted with Mike Maddox. Also on the show was Kent Housler, President & CEO – Personnel World, talking about how technology has helped the staffing industry. Tec ...

Read More »

Bottom Line IT featuring Rizzi Designs John Addis

Posted date: May 19, 2012

With Mike and Matt enjoying some time off, Bottom Line IT will re-air the show from April 28 featuring guest John Addis – Web and Media Director – Rizzi Designs Segments 1 and 2 include technology news topics The Magic of Doing One Thing ...

Read More »