The opportunity costs of VPNs

Opportunity cost is a term from microeconomic theory, which weighs the value of choices to help determine the best costs of a decision. It’s the difference between scarcity and choice. When it comes to your business’s IT costs, when you budget for each purchase, your opportunity cost is the inability to afford something else. Here’s […]


Read More...

Understand net neutrality and the false claims

Liar, liar pants on fire. Net neutrality and the FCC are unhappy bedfellows recently, and it’s important to arm yourself with knowledge about what’s going on and what misleading information is posted to try and sway public opinion. Here is a summary of some of the main points as highlighted in Consumerist to separate fact […]


Read More...

What New York’s cyber security regulations mean for you

The state of New York has established cyber security requirements that financial services companies must comply with to “ensure the confidentiality, integrity and availability of information systems” in the following five areas: Identification of cyber risks Implementation of policies and procedures to prevent unauthorized access Detection of cyber security events Responsiveness to known cyber security […]


Read More...

Encryption 101: How to Keep your Data Safe

Encryption constantly comes up when discussing computer technology. However, the concept of encryption is much older than computers, with examples being found in ancient Egypt, Greece, and India. Militaries and governments throughout human history commonly used cyphers to create manual cryptographic messages that could only be translated with a specific key. In addition, steganography was […]


Read More...

How to Secure Your Vehicle WiFi (for Fleet Management or Personal Vehicle)

The Internet of Things enables us to connect devices that weren’t traditionally connected to the Internet. One such device is our automobiles – with both commercial fleets and personal vehicles utilizing telematics to keep vehicles connected. On one hand, it’s a much-needed advance in technology that allows remote monitoring of fuel efficiency, accidents, and mechanical […]


Read More...

Know These Five Tactics Cyber Attackers Use To Hurt Internet Users

Internet criminals are continually inventing new ways to threaten and damage web users, says Francis Dinha, CEO of OpenVPN, which powers the VPN service Private Tunnel, noting the public needs to be vigilant while surfing the internet. Several types of crime stand out as particularly urgent to the public. “Knowing the threat helps you defend […]


Read More...

3 Great Products and Services to Protect Your Data on Road Trips

The weather is warming up, spring break is winding down, and summer vacation is almost here. A recent AAA survey found 35-percent of Americans plan to take family vacations this year with 69% of those people planning road trips. I love road trips. Sightseeing different landscapes from the road, trying regional foods, meeting new people […]


Read More...

The Costs of Cybercrime: How Much Does It Really Impact You?  

Cybercrime is a major concern – recent studies show that while crimes like burglary and grand theft auto are down, fraud and cybercrime instances continue to rise. It’s a sign of criminals discovering new ways to make profits. Whether exploiting vulnerabilities to access and sell sensitive information or installing ransomware that forces users to pay […]


Read More...

Why Email Is More Secure Than Text

Email is older than the Internet itself, with one of the first systems used by the Massachusetts Institute of Technology as early as 1965. Over 50 years later, the technology is still one of the most widely used Internet applications, with over 600 million people around the world using it. With social media, chat programs, […]


Read More...

BYOD Policies to Keep Your Business Network Safe  

Back in day, working at a corporation was the only time you ever got hands-on with a computer. Now we carry them in our pockets and even wear them on our wrists and faces. According to the CTIA, the number of cell phones (327.6 million as of 2011) in the U.S. surpasses the country’s population […]


Read More...