Quantcast
Channel: Jeff Hughes | Hermetic Networks, Inc.
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Hermetic’s PC Buying Guide Pt.1

As many of you already know, we’re very happy to be able to offer small businesses discounts on computer hardware from a slew of different vendors, such as Dell, HP and Lenovo. Typically we know our...

View Article


Image may be NSFW.
Clik here to view.

Hermetic’s PC Buying Guide: Pt.2

Picking up from where we left off last time, there’s a great deal to be said about how manufacturers price, build and sell their hardware. We’ll start by giving you an idea of the differences between a...

View Article

Lessons From Shmoocon 2012

We’re back from another great Shmoocon weekend in DC with some very interesting lessons learned. For those of you who haven’t heard us talk about it before, Shmoocon is a yearly information security...

View Article

Always Check Android Permissions

Just in from Packet Storm, Symantec has released information regarding the largest Android malware distribution yet. Named Android.Counterclank, it has been found in around 13 apps throughout the...

View Article

Mac Malware in Detail

In the wake of the recent “Flashback” Trojan, I’m sure many of you are wondering why your mac was able to contract this in the first place.  It’s not your fault; Apple is notorious for misleading...

View Article


The risk of running Windows XP after EOL (April 8)

As many of our customers know, Windows XP is coming up on End of Life on April 8th, 2014. For many businesses we serve, it won’t be a problem – not even a blip in the radar. For others, it means...

View Article

Image may be NSFW.
Clik here to view.

Ransomware and Your Business

Believed to first have been identified in 2013, there’s a new kind of malicious threat floating around the web that continues to pose a risk to business data: ransomware. Ransomware is a type of...

View Article

Image may be NSFW.
Clik here to view.

Secure your web traffic; Why HTTPS is important

There are many ways to transmit information over the Internet from one place to another and all different systems use all different mechanisms and protocols to transmit data from point A to point B....

View Article


Image may be NSFW.
Clik here to view.

Third-Party Application Security

2014 was a big year for security breaches. Sony, Target, Home Depot, and even Goodwill were severely compromised, leaking an unknown amount of customer information and critical corporate data, some of...

View Article


It’s 2016. Google better. Looking right at you, Dad.

Google is ubiquitous with finding what you need—sometimes without even realizing you were looking for it. In recent years, the company has started to connect more and more of the everyman’s life with...

View Article
Browsing all 10 articles
Browse latest View live