Do you employ a biometric security solution at your company to control building access? If your solution employs BioStar 2 technology (which is often integrated into third-party systems such as Nedap’s AEOS access control system), you have cause for concern. Recently, researchers from vpnMentor announced that they uncovered a massive database. It is about 23 […]
A security researcher known as “_MG_” on Twitter has invented a modified Apple Lightning cable that could allow a hacker to remotely access any Mac computer using them. He demonstrated his new invention, dubbed the “OM.G Cable” at the Def Con hacking conference in Las Vegas recently. The Lightning Cable is used by Apple owners […]
Being more of a nuisance than anything, adware doesn’t see as many innovations as other forms of malware. Once in a while, an adware developer surprises the security researchers. That happened recently when two researchers working for enSilo discovered an innovation in an adware strain, known as DealPly. As Adi Zeligson and Rotem Kerner indicated […]
Researchers at CheckMarx recently discovered some serious security flaws in the popular LeapPad Ultimate tablet. The tablet was designed by LeapFrog to provide kids in the UK and Europe with a safe environment to access games, videos and educational apps. The researchers had this to say about their discovery: “The first thing we found […]
Grim news comes out of Russia, as reported by Microsoft. The tech giant has been tracking the activities of a Russian hacking group that goes by the name of Strontium. Their other names include APT28 and Fancy Bear. Microsoft has confirmed that the group was behind a new attack that took place in April of […]
Recovering from an IT disaster is costly. How costly? This eBook details the business impact and provides helpful tips for assessing risk and prioritizing action steps. Download it with our compliments and contact us to learn how Fusion Technology Solutions can help you develop a reliable disaster recovery strategy.
Security breaches and their business impact make the headlines frequently, underscoring the need for more stringent security.
In fact, 74% of IT leaders say security concerns are what holds them back from moving to the #cloud. What is the reality?
Get the real story from this eBook on four common myths about cloud security and #MSCloud facts. To get started, contact us to have your questions answered about Windows 10 and Office 365 solutions from Fusion Technology Solutions.
Who can you trust to manage, migrate and store your valuable business data? If you’re evaluating vendors, watch this video to get a laugh and some insight into why you should choose Veeam’s #1 data management service from Fusion Technology Solutions.
According to @BCG, 61% of employees believe effective business tools are vital to offering faster services. Work smarter, not harder. Protect your everyday business, while saving time and resources.
With #Windows 10 and #Office365, you can increase productivity, ensure security, and reduce cost. Get modern with Fusion Technology Solutions and Microsoft.
Hardly a week goes by that we don’t see another major data breach making the headlines. The latest company to fall victim to hackers is CafePress. They are well-known on the internet for offering a platform where users can create their own customized coffee mugs, tee shirts and the like. The company didn’t make a […]