When it comes to getting a new car, one of the first decisions many consider is whether to buy or lease. Of course, there are pros and cons to either approach. Buying a car means you own it (and perhaps get positive feelings about owning it), and you have more freedom over its use; you […]
If you see grown men and women staring at their phones as they walk into police stations, churches or the backyards of strangers, you could be witness to the latest video gaming phenomenon to take the world by storm.
Many companies are continually struggling to protect customer data from hackers, thieves and other cybersecurity threats. Some firms have begun using biometric data in place of passwords. For example, many banks now allow customers to use fingerprint or iris identification to access bank accounts from mobile devices. This includes Bank of America, JP Morgan Chase […]
You may have noticed that when you send a large file attachment by email, it sometimes gets kicked back to you undelivered with an error message that says something like: “The attachment size exceeds the allowable limit.” But what are these limits? And how can you securely send a large file attachment when it’s too […]
In the recent Tech Essentials article “Changing Trends in Cyber Security,” we highlighted how hackers are becoming more innovative in their ability to use generally available social media (i.e. LinkedIn recruiter tools) and other business applications to target email recipients with imposter email and lure them into wiring money to hackers.
April 11, 2025
April 04, 2025
March 28, 2025
March 21, 2025
March 14, 2025