Contact Us:

(505) 792-2375

The Top 10 Ways Hackers Get Around Your Firewall and Anti-Virus To Rob You Blind

Cybercrime is at an all-time high, and hackers are setting their sights on small and medium businesses who are “low hanging fruit.” Don’t be their next victim! This report reveals the most common ways that hackers get in and how to protect yourself today. Are You A Sitting Duck? You, the CEO of a small business, are under attack. Right … Read more

Beware of Fake Apps!

Ryan loved tweaking photos on his Android phone. He’d heard rave reviews from his friends with iPhones about Prisma, a new iOS app for image editing. So when he heard Prisma would soon be released for Android, he logged in to the Google Play Store to see if it was there yet. To his surprise, he found one that looked … Read more

Your #1 Data Security Threat

If you thought spam (junk e-mail) was just an annoying nuisance, think again. Unfortunately, human beings communicating by e-mail often turn out to be the weakest link in your network’s defenses. That’s why cybercriminals often rely on spamming to inject their toxic code into their victims’ computers. And, just as malware is becoming ever more potent, so are the tactics … Read more

Educational Technology – What Administrators Need to Know

[row] [column md=”4″] [/column] [column md=”8″] Thursday, April 14th Thursday May 19th 10:00am—2:00pm Grand Canyon University 6700University NE, Albuquerque Learn about technology in education and what specifically administrators need to know about: Software Licensing Perpetual Licensing Subscription Models Maintenance and Support Cloud Computing Office 365 Google Apps Cloud Servers & Hosted Solutions Security Threat Protection Contingency Planning Disaster Recovery Hardware … Read more

Spooked About Your Network’s Security?

Not too long ago, in a place not so far away…when ancient hordes attacked your city, a single breach in the wall could mean certain death – or at least the end of life as you know it. Yet times change…or do they? Attacks by today’s cybercriminals on your network, while perhaps not physically life-threatening, can inflict severe damage to … Read more

client relations cloud computing communication credit cards cyber attacks cyber security data security downloads email email security encryption facebook firewall hacked hardware HIPAA internet phone systems linkedin malware network admin networking network security online banking password password management password security PCI Compliance Personal Device phishing phone systems Public WiFi ransomware sales security security breach social media strong password strong password security successful habits technology time management voice over ip voip work flow work habits