Warning: A non-numeric value encountered in /nfs/c10/h05/mnt/228662/domains/peggnet.com/html/wp-content/themes/sparks/framework/modules/title/title-functions.php on line 455

Author: Margie Matrisciano

They don’t call you back, they don’t text back, and when you get time with them, they are disheveled, rude and uninterested, doing barely enough to keep things going. This sounds like a bad date…and it’s one that many businesses are on with their current IT...

It’s not just cybercriminals who hack into networks and steal data. Most business owners erroneously think cybercrime is limited to hackers based in China or Russia, but the evidence is overwhelming that disgruntled employees, both of your company and your vendors, can cause significant losses due...

One of the common issues on the Dark Web – whether you use it or not – is the sale of passwords, bank account information, Social Security numbers, and other private data. Hackers can breach firewalls and software to obtain this information and then go to...

Users are the weakest link in security, given a lack of education and experience. Instituting a security awareness training program for every member of your staff will significantly reduce the probability of user-related errors and exposures. Get started with developing a security-first culture with user training....

Fake virus messages have been popping u i browsers for years. A pop-up window alerts you that your computer is infected with viruses and the only option to get rid of the pop-up is to click OK. It encourages you to scan your device with...

Someone sets up an open-access Wi-Fi hotspot in a high-traffic area such as a coffee shop or airport that’s connected to their laptop. Once you join, this person has access to your computer and mines it for financial and personal data. Keep your devices safe by...

Someone duplicates a social network profile belonging to a friend and then adds you. Once you confirm, the person has access to personal information that can be used to hack into your accounts, such as your birthday, parents’ names, and pets’ names. They can also...

Scammers access one of your associates’ email accounts or social networks and send out fake emails or direct messages to all of his or her contacts. They often include an attachment or a link to a fraudulent file-sharing website and ask you to download a...