The Big Business of Malware
Author: Neal Shelton, Techie at Claris Networks Malware is big business, and infecting your computer is a cybercriminal’s cash cow. Hackers and other cybercriminals create malware which banks them...
View Article5 Easy Ways to Spot Phishing Attacks
“Phishing” is the method of using email to deceive someone into providing personal/financial information or downloading a piece of malicious software. Plain and simple, phishing is easy, cheap, and...
View Article2014 Business Solution Summit – Dec 4th Nashville
For those of you in Nashville, you’ll want to mark your calendar for an event in early December: “The 2014 Business Solution Summit” presented by JourneyTeam. Event Details Tuesday, December 4th, 2014...
View ArticleEndpoint Encryption: The cheap and easy way to avoid a data breach
Which would you rather have: $50 or $1? The question is as much a no-brainer to thieves and cybercriminals as it is to us, which is exactly why healthcare companies have a huge target on their backs....
View ArticleKnoxville Cyber Summit – February 5, 2015
You’re invited From identity theft and fraud to corporate hacking attacks, cyber security has never been more important for businesses and organizations. Join us on Thursday, February 5, for an...
View ArticlePenny’s Gamble: A Practice Administrator’s Game of HIPAA Roulette
This is the fictional, but all-too-likely story of how Penny the Practice Administrator learned a single laptop would cost her $1.5 Million, and what she could have done to prevent it. Penny’s restful...
View ArticleVideo: Introducing Endpoint Encryption Services
In 2014, businesses across the country experienced two very rude awakenings: The security of their data was integral to the success of their business, and… They could no longer take that security for...
View Article27 Tips & Insights from the Knoxville Cyber Security Summit
2014 was a linchpin year for the topic of cyber-security. Significant breaches and increased regulation have propelled it to the forefront of every thoughtful business leader’s mind. Last week, several...
View ArticleTop Technology Security Breaches of 2014
2014 was a turbulent year in the world of technology security and data privacy. Businesses of every size in every industry experienced data breaches of one sort or another. It doesn’t take a nationwide...
View ArticleClaris & TekLinks: Better Together
Author: Josh Cantrell Sweet tea and a slice of lemon. Peanut butter and jelly. Cookies and milk. Some things are much better together than they are alone. Companies are the same way. A great...
View Article