Hermetic’s PC Buying Guide Pt.1
As many of you already know, we’re very happy to be able to offer small businesses discounts on computer hardware from a slew of different vendors, such as Dell, HP and Lenovo. Typically we know our...
View ArticleHermetic’s PC Buying Guide: Pt.2
Picking up from where we left off last time, there’s a great deal to be said about how manufacturers price, build and sell their hardware. We’ll start by giving you an idea of the differences between a...
View ArticleLessons From Shmoocon 2012
We’re back from another great Shmoocon weekend in DC with some very interesting lessons learned. For those of you who haven’t heard us talk about it before, Shmoocon is a yearly information security...
View ArticleAlways Check Android Permissions
Just in from Packet Storm, Symantec has released information regarding the largest Android malware distribution yet. Named Android.Counterclank, it has been found in around 13 apps throughout the...
View ArticleMac Malware in Detail
In the wake of the recent “Flashback” Trojan, I’m sure many of you are wondering why your mac was able to contract this in the first place. It’s not your fault; Apple is notorious for misleading...
View ArticleThe risk of running Windows XP after EOL (April 8)
As many of our customers know, Windows XP is coming up on End of Life on April 8th, 2014. For many businesses we serve, it won’t be a problem – not even a blip in the radar. For others, it means...
View ArticleRansomware and Your Business
Believed to first have been identified in 2013, there’s a new kind of malicious threat floating around the web that continues to pose a risk to business data: ransomware. Ransomware is a type of...
View ArticleSecure your web traffic; Why HTTPS is important
There are many ways to transmit information over the Internet from one place to another and all different systems use all different mechanisms and protocols to transmit data from point A to point B....
View ArticleThird-Party Application Security
2014 was a big year for security breaches. Sony, Target, Home Depot, and even Goodwill were severely compromised, leaking an unknown amount of customer information and critical corporate data, some of...
View ArticleIt’s 2016. Google better. Looking right at you, Dad.
Google is ubiquitous with finding what you need—sometimes without even realizing you were looking for it. In recent years, the company has started to connect more and more of the everyman’s life with...
View Article