SUBMIT SUPPORT REQUEST

How to Choose the Right Managed IT Provider

The relationship you have with your managed services provider is an important one, make sure it is a positive business partnership. Technology gets more complicated every day and companies with already limited resources have to choose between investing in what they...

Cyber Security Training for your Employees from SNC

Thorough training is a great way to bolster your cyber security capabilities, here are some tips on how your company can support it and make sure it sticks. Your network can have the most powerful and expensive firewalls, it could be monitored 24/7, you may conduct...

The Ultimate Guide to Phishing Prevention

Threat management strategies help you identify and prevent phishing scams Technology is constantly evolving, and there are no signs of that ever changing. With the explosive rise of cloud computing, businesses are performing more efficiently than ever before....

White Hat Hacking 101-What You Need to Know

Ethical hacking is the ultimate game of chess played by some of the sharpest network security professionals When you hear the term “hacking,” what usually comes to mind? You probably picture something like a malicious hacker committing a data breach and causing...

Amazon Sellers Dealing With Increased Hacking And Fraud

Amazon has a problem. If you’re an Amazon shopper, that means you have a problem. The company recently revealed that more than a hundred sellers using the company’s platform were victims of what the company is describing as an “extensive fraud...

Chrome Will Offer More Ways To Control Web Tracking

Google announced a pair of important security features of upcoming versions of its Chrome browser at this year’s I/O Developer Conference. Both changes are designed with the same goal in mind: To give users some additional tools to block or at least mitigate the...

Some Dell Systems Are At Risk Of New Hacks

Do you use Dell equipment at home or in your office? If so, then the recent discovery made by independent security researcher Bill Demirkapi should give you pause. Recently, Mr. Demrikapi discovered a flaw in the company’s SupportAssist utility that comes...

Security Is Now A Concern For Open Source Software

This year’s Open Source Security and Risk Analysis Report analyzed the anonymized data of more than 1,200 commercial codebases from 2018. According to the report, managing open source risk continues to pose a significant challenge for industry. The Synopsys...

Stolen Personal And Medical Information Was Found Online

Jeremiah Fowler, a researcher with Security Discovery recently found an unprotected Elasticsearch databased owned by a company called SkyMed on the internet.  According to his findings the database was configured such that it was open and visible to any browser. This...

Google Giving More Flexibility To Private Data Removal

Tech giant Google recently unveiled the next step in its plan to put more power in the hands of users when it comes to their own data.  The most recent change involves the introduction of a new auto-delete feature tied to your Google account. It will allow you to set...