Spoofing & Hacking: What’s The Difference?

Most people know not to open email attachments from senders that they do not know. Unfortunately, it is not just attachments from strangers that you have to be on the lookout for. It happens quite often that people…

The CEO/CIO Relationship: A Vital Tie

In its look at the top 10 strategic technology trends for 2019, Gartner notes that businesses need to address an astounding number of technologies that will change the way companies run, their business models and their internal processes. From the…

Important Warning From The FBI

Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that…

These 4 Issues are Paralyzing CFOs from Moving to the Cloud

CFOs have long been challenged by the value proposition of capital technology investments, often requiring in-depth analysis and reviews before making the plunge. While the lower monthly costs of cloud-based computing may overcome this inertia in some instances,…