Request Free Consultation

Our Blog

Don’t Ignore the Basics When Hiring a Web Developer

Don’t Ignore the Basics When Hiring a Web Developer

You’ve interviewed several firms to develop your website.  You’ve picked the one that could best meet all of your business needs now and in the future. You’ve signed the contract and forked over an initial payment to get the project rolling. It’s only much later in the relationship that you discover that you missed a […]

Read more
How to Foil Brute Force Password Attacks

How to Foil Brute Force Password Attacks

WordPress administrators take note: According to Microsoft security researcher Ross Bevington, brute-force attackers focus primarily on guessing short passwords to gain entry into protected systems. He found that very few attacks involve access credentials comprised of long passwords, or passwords that use complex character combinations. These conclusions are the result of analysis of data collected […]

Read more
Check Your Website for ADA Compliance

Check Your Website for ADA Compliance

Many businesses do not realize that their websites and mobile apps must comply with the Americans with Disabilities Act. If your website and apps are not accessible to persons with vision and hearing disabilities, you risk a federal lawsuit. Although Congress never mentioned websites in Title III of the ADA, which covers public accommodations, U.S. […]

Read more
How to Push Visitors to a Purchase

How to Push Visitors to a Purchase

When we see a good idea, we are not adverse to helping spread the word, even if it comes from a potential competitor. In this case we are spreading six good ideas from the New York City website design company, Huemor. They recently issued a press release in which they share six of the most […]

Read more
Encryption Backdoors Will Make Us All More Vulnerable

Encryption Backdoors Will Make Us All More Vulnerable

In the aftermath of every terrorist attack or high-profile cybercrime, it is usually revealed by security professionals through the media that the terrorists or criminals used encrypted communications, enabling them to plan and coordinate their activities without raising suspicion among the intelligence and law enforcement communities.

Read more
Is the Internet in Danger of Collapse?

Is the Internet in Danger of Collapse?

The Council on Foreign Relations has published a 116-page report, “Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet”. The report’s Executive Summary sets the tone of the CFR’s analysis and recommendations: “The utopian vision of an open, reliable, and secure global network has not been achieved and is unlikely ever to be realized. […]

Read more
What Might Cyber Security Look Like in the Future?

What Might Cyber Security Look Like in the Future?

The present state of Internet security is inadequate to handle the threat posed by future quantum computers that are expected to be far more powerful than today’s conventional systems. This means that the digital systems we have come to rely on for online banking, ecommerce, healthcare, email and other applications may one day be rendered […]

Read more
How to Prevent Your Business from Being Hit with Ransomware

How to Prevent Your Business from Being Hit with Ransomware

Ransomware attacks are on the rise, hitting businesses and government agencies around the world. Cyber criminals use a variety of methods to gain access to vulnerable systems and, once a target system is breached, the malware disables security features within the victim’s network. Prior to execution of the ransomware all data files are stolen, including […]

Read more
Skip to content