Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time to make the switch this year, […]
At one point or another, everybody has done it. You open a browser and type in the URL of a site you visit frequently. In doing so, your finger slips and you mistype it. Sometimes, nothing comes of it except that you get an error message. Knowing that, increasing numbers of hackers have gotten into […]
One of the unfortunate truths about apps is that many developers use deceptive practices to try and confuse consumers. They try to mislead them about how much custom features cost and when in-app purchases occur. Many attempt to hide or obfuscate the particulars of subscription details. The thinking here is pretty simple: First of all, […]
In the world of hacking, steganography ranks as one of the most difficult methodologies to detect. If you’re not familiar with the term, it is the practice of embedding executable code inside images, which makes it virtually impossible to detect. The reason is simple: Virus scanners are built around the idea of searching for text […]
Google has kept no secret of their plan to eventually put an end to their social media experiment, Google+. In case you haven’t been keeping abreast of the company’s announcements where the service is concerned, be aware that it will be shutting down on April 2nd of 2019. The closer we’ve gotten to that deadline, […]
Ransomware attacks just keep increasing This cyberattack scheme isn’t new, but it has become increasingly common over the past several years. Many of the viruses lurking out there steal data to be used for nefarious purposes. The goal has long been to access important financial and personal data that can be sold off. For […]
Who must be notified under HIPAA when bad things happen? So you know HIPAA regulates Protected Health Information, but in the event of a breach, which of your disaster recovery plans include the steps to take in order to meet legal notification requirements? HIPAA identifies who must be notified in the event of a breach. […]
On paper, UltraViolet seemed like a great idea. It was (and still is, for the moment) a service that stored your license information for various digital media you purchased. You could buy a movie from Amazon Prime, buy something else from some other online vendor, and watch them on any number of devices without having […]
The first browser update of 2019 is officially out. Both Google’s Chrome and Mozilla’s Firefox browsers are getting a raft of security fixes that will help make Mac, Linux and Windows users safer and more secure. The latest build of Chrome addresses nearly sixty CVE-level flaws, seventeen of which are rated as being “high” severity, […]
In an age where most business happens online, not showing up in Google search results can really hurt you. While there’s no real shortcut to showing up consistently on web searches, there are a few quick fixes to get your site to show up on your potential customer’s search results… 1. HTML tags […]