IT

According to the 2019 MidYear QuickView Data Breach Report, the first six months of 2019 saw 3,800 publicly disclosed breaches exposing an incredible 4.1 billion compromised records. Though a majority of these breaches had a moderate or low severity score, no organization is too small to be on the...

For years, setting up a new computer, whether it’s for new employees or rebuilding a computer due to a failure or loss, has been a very tedious process. Employees are impacted by the time it takes to recover. Companies are pained by the cost it takes to build these computers. User licenses are not always available,...

Voice calls are still the backbone of internal and external communication for organizations across any industry. To ensure this communication is effective, it often needs to be transcribed. For example, if you have an important meeting with a client, somebody would have to take notes throughout the meeting for future reference, correct?...

This month there are 61 unique CVE’s, 10 critical and 1 being exploited. Out of these we pay close attention to CVE-2019-1367 . CVE-2019-1367 | Scripting Engine Memory Corruption Vulnerability A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory...

This month there are 80 unique CVE’s, 2 exploited or disclosed and 3 public. The most pressing issues this month are CVE-2019-1214  and CVE-2019-1215. Both are elevation of privilege (EoP) vulnerabilities. These types of vulnerabilities are usually exploited by malware to gain the ability to...

With #GivingTuesday less than 3 months away (December 3, 2019), most nonprofits are gearing up for their year-end giving campaigns. Creating and managing a dedicated donation page for Giving Tuesday is a vital part of these fundraising campaigns. But how does your nonprofit ensure that it does not fall prey to bots that are always trying to make fraudulent transactions on your donation page? Let’s find out together.  Problem:  Fraudulent transactions are...