Apple Government agency finds way to unlock iPhones Cellebrite, an Israel-based vendor that works with the U.S. government, has revealed that they've found a way to unlock practically…TruewaterMarch 13, 2018
Security Browsers leak sensitive info to hackers The Autofill feature fills a void in the web browsing habits of many. It eliminates the need to enter all…TruewaterJanuary 27, 2017
Security Ransomware adopting self-replication Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite…TruewaterJune 9, 2016
Security Different types of hackers defined Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details…TruewaterApril 28, 2016
Healthcare Ransomware alert for healthcare practices Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported…TruewaterApril 27, 2016
Office New email security feature for Office 365 While you can take many security precautions to protect your organization, a cyber attack is always possible because of human…TruewaterApril 21, 2016
Security How is BYOD a security risk? Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company…TruewaterApril 13, 2016
Web & Cloud Cloud myths debunked From hosting websites, email, applications and online file storage, the cloud has become a popular alternative to traditional IT services…TruewaterMarch 8, 2016
Security Security tips for the small business It’s been said so many times that many small business owners are likely to block it out, but the truth…TruewaterJanuary 25, 2016