Business Why you need to back up your mobile devices There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much…TruewaterApril 20, 2017
Security Some ransomware strains are free to decrypt Ransomware is everywhere. Over the last couple years, dozens of unique versions of the malware have sprung up with a…TruewaterMarch 22, 2017
Hardware Firewalls: hardware vs. software Most people have a vague idea of what a network firewall does. But some business owners are easily fooled by…TruewaterMarch 15, 2017
Android Malware on Android smartphones The average smartphone user doesn't give nearly enough consideration to mobile phone security. In fact, smartphone users are more likely…TruewaterMarch 14, 2017
Security Is fileless malware a threat to you? There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless”…TruewaterMarch 3, 2017
Apple Fruitfly: the latest Apple malware For decades, Apple has enjoyed a reputation of being nearly invulnerable to threats of malware. That may be an exaggeration,…TruewaterJanuary 25, 2017
Security Cyber security and managed services Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other…TruewaterJanuary 12, 2017
Security Ransomware demands more victims for freedom Popcorn Time is taking ransomware to a new level of devilish trickery by asking victims to give up two of…TruewaterDecember 28, 2016
Android Gooligan malware wreaks havoc on Android Google has to contend with yet another malware attack that targets older Android users. Gooligan is a variation of the…TruewaterDecember 15, 2016
Android Vicious malware spreads through app stores Android developers are on the lookout for a malicious malware that is attacking app stores and users across the United…TruewaterOctober 28, 2016