Apple Fruitfly: the latest Apple malware For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration,…TruewaterJanuary 25, 2017
Security Cyber security and managed services Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other…TruewaterJanuary 12, 2017
Security Five tips to avoid a security breach If you’ve read this blog before, you already know security is paramount to the success of any small business. We…TruewaterNovember 25, 2016
Hardware IoT scanner detects at-risk “Smart Devices” After the recent Dyn attack that took Netflix and other major websites down, business owners are vigilant about ensuring the…TruewaterNovember 23, 2016
Security Young workers are more gullible to tech scams The old cold-call scam is still a popular way for fraudsters to dupe people out of their money. But now…TruewaterNovember 10, 2016
VoIP Denial of service attacks on VoIP systems When most of us think of cyberattacks, we think of viruses, trojans, and ransomware. Unfortunately, those aren’t the only types…TruewaterOctober 24, 2016
Security Social engineering and cyber security Social engineering is the ability to manipulate people into willfully giving up their confidential information. The data varies, but in…TruewaterOctober 7, 2016
Windows Fantom: the latest cybersecurity spectre It’s hard to deny how quickly the different types of ransomware multiply -- they do so faster than rabbits during…TruewaterSeptember 7, 2016
Security 5 simple but manageable security measures Don't be put off by the tech jargon of security experts you find in forums and self-help books. A managed…TruewaterJuly 14, 2016
Healthcare & EMR General Healthcare trends to watch for in 2016 As 2015 came to a close, there are several trends in the healthcare industry that medical researchers and practitioners need…TruewaterJanuary 11, 2016