1. Fines, Penalties, and Violations – Oh My!

    Global data protection regulations (new or updated) are being enforced aggressively, resulting in a tsunami of hefty fines and penalties handed out to violators. The majority of these violations are a result of the failure to conduct regular risk assessments, which form an integral part of the "appropriate measures" a business must take to ensure information security. For example, in 2017, credit …Read More

  2. Monitor, Test, Restore – Making Sure Your Backups Are Ready!

    Backups play a critical role in any data protection strategy. If you're counting on your backups for disaster recovery and business continuity, unexpected backup failure can prove to be disastrous for your business. Especially when backups are scheduled automatically, you run the risk of falling victim to media failure, software issues, cyberattacks, or even a simple human error. A study estimated…Read More


    Did you know your browsing history could be sold to some of the largest companies in the world? New light has recently been shined on the secretive sale of people’s internet browsing histories, through a joint investigation by Motherboard and PCMag. It came to light that “Jumpshot,” a subsidiary of Avast, an antivirus program used by hundreds of millions of people worldwide, was selling high…Read More


    Question: Who would win a face-off between Office 365 and Microsoft Office 2019? Answer: Office 365 crushes it – and here’s why. Office 365 includes the fully-installed latest versions of Word, Excel, Powerpoint, Outlook, OneNote, and OneDrive, with all of their new and improved capabilities updated monthly. It’s also connected to the cloud so content can be accessed from any device, in real…Read More


    Do you ever get the feeling you’re being stalked – by advertisements? How do online shopping sites always seem to know what you’re looking for – are they psychic? Why does that same ad pop up again and again, wherever you are? And why do these ads stalk and pester you everywhere you go until they annoy the crap out of you? The creepy reality is, third-party web trackers are behind the scen…Read More


    What exactly is the “Dark Web”? Is it a dank, gloomy, scary place where giant, hairy tarantulas hang out? If so, I’m leaving town! In actuality, the Dark Web refers to a collection of websites that can’t be reached by traditional search engines – the areas you and I can’t typically access via Google, Yahoo, or Bing. The area we surf is considered the “Surface Web,” which embodies o…Read More


    The internet is being increasingly populated with false, misleading, manipulated videos, spread by politicians and advocacy groups as well as regular Joes. Video footage is being altered three main ways: either by being taken out of context, deceptively edited, or deliberately altered. Here’s a breakdown on these misleading practices to help you better determine whether what you’re looking at …Read More


    When you open Chrome to surf the Web, do you have any idea what or who’s looking back at you? If you peer under the hood of Google Chrome, you’ll discover shopping, news, and government sites quietly tagging your browser to let a few thousand friends in the form of ad and data companies ride shotgun while you click around the Web. Seen from the inside, Google’s Chrome browser resembles snoop…Read More


    Your smartphone contains a trove of information advertisers utilize to build a custom profile of your daily phone usage. Your profile contains information on where you’ve been, what you’ve been looking at, and what you’ve been clicking on. Advertisers then push targeted ads based on your perceived interests. Do you want advertisers collecting this information about you? If not, you have the …Read More


    Your iPhone tracks every place you visit. It knows where you are and it remembers where you’ve been. It keeps a record of frequently visited places and uses the data to make location-based suggestions. It can even determine whether you drove or walked to a location (see figure at left). This data is supposedly encrypted and stored on your phone – not collected by Apple. But is this really nece…Read More