Uncategorized


How Tech has Evolved. And How it Really Hasn’t.

It’s Time to Fix What’s Been Broken From the Get-Go As humans, we’ve evolved a fair amount. But Technology is another animal altogether. Taking a look at our infographic, the technological shifts we’ve witnessed since the 1950s are nothing short of mind blowing. From pen and paper and a phone, to today’s superpowered mobile devices, […]


Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems

Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems. Windows and Linux systems are in the cyber-crosshairs of a recently uncovered ransomware, in what appears to be a targeted campaign.  Tycoon is a multi-platform Java ransomware that is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image […]


Best Practices for SMEs’ Data Security

Data Security at SME’s are targeted by cyber attackers for their lack of resources or expertise to effectively protect their data. Managed security services provider Alert Logic estimates that small businesses make up 58% of malware attack victims, and that 94% of these attacks are carried out through malware or phishing emails disguised as bills, […]


TraitWare® offers FREE Passwordless Login Security to Citrix customers

TraitWare® offers FREE Passwordless Login Security to Citrix customers First and foremost, the health and safety of friends and families takes precedence.  With the developing changes surrounding the COVID-19 emergency, companies are adopting rapid procedures to help protect their employees.  The most immediate change that most companies are adopting is a shift to working remotely.    […]


DUH, IT’S THE ECONOMICS

Most of you who read these articles are the techie/nerdie/geekie types. I am the guy who sits across the table from you, and to be perfectly honest, I really don’t understand much of what you are saying. That being said, I am very concerned, interested and focused on the bottom line. If there is an […]


How Secure is Passwordless Authentication

As humanity further progresses in the digital era, computer passwords, which were used to ensure our security on the world wide web have become liabilities. Passwords are weak links that are often targeted by cybercriminals. From time to time, we hear about massive breaches which compromise millions of user passwords from big platforms. The era […]


5 Tips for Better WordPress Login Security on Your Sign In Page

WordPress Login Security  One common vulnerability among WordPress login security is the weakness of the login page. Brute force attacks and hacks often start with the weakest link; login credentials. Here are some tips to implement in your WordPress login page increasing security keeping cybercriminals at bay.  1. Change Your Login Page URL For instance […]


The end of the era of passwords

The father of computer passwords – Fernando Corbató – died on July 12 at the age of 93. Corbató pioneered the password for the computing world in the 1960s, working at the Massachusetts Institute of Technology (MIT). He and other researchers at the university shared access to one of the first computers with the ability […]


Why Businesses choose Single Sign On. (SSO)

What is Single Sign On? Single Sign On, shortened to SSO, is a method of authentication that allows users to access multiple applications with one set of login credentials. A perfect example of SSO that you’ve no doubt used is Google’s Suite or Office 365. Once you log in, you will be automatically logged into […]


Passwordless Authentication_ A Safeguard from Data Breaches

The Growing Threat of Data Breaches Technology advances at a breakneck pace, and much of that technology needs our personal information to function. Many devices and applications won’t allow you to use them unless you share your personal, identifying information first. In an age of information brokering, your personal data becomes worth more than gold. […]