GCU teams up with Open Arizona Cyber Warfare Range- Metro Phoenix
Dec05

GCU teams up with Open Arizona Cyber Warfare Range- Metro Phoenix

With cyber warfare becoming an ever-present threat upon our natural way of life in the 21st century, a brand new state of the art cyber warfare range is coming to Phoenix’s very own Grand Canyon University as the range will act as a cybersecurity operating station. Grand Canyon University, Arizona Cyber Threat Response Alliance (ACTRA), a non-profit organization that teams up with the FBI, the Arizona Counter Terrorism Information...

Read More
The pros and cons of BYOD computing
Jul11

The pros and cons of BYOD computing

Gone are the days of begrudgingly using your office’s computers and tablets to get your work done. One of the hottest things in business right now is “bring your own device” (BYOD) computing—instead of using your office’s devices at work, you bring your own. Of course, there are caveats to what otherwise sounds like a simple and reasonable concept. Here are the pros and cons of BYOD computing for businesses of all sizes. Pros Face it,...

Read More
How secure are smart home devices?
May08

How secure are smart home devices?

First we accessed the Internet on computers. Then we combined the Internet with our phones. Now, you can get all kinds of Internet-connected devices specifically built to make your home more comfortable, more fun, and more connected. From “smart” coffee pots and thermostats to security systems, more and more household devices are becoming connected to the Internet. There are obviously a lot of benefits that come with smart home...

Read More
5 Tips for Securing Your Data
Apr19

5 Tips for Securing Your Data

Data security is crucial, and not just for Fortune 500 companies, but for small businesses as well. It’s common for small business owners to think that data hackers won’t bother with a small company, but it’s typically easier for hackers to get into smaller entities’ databases that have less sophisticated security systems. In fact, according to the 2016 Internet Security Threat Report from Symantec, 62 percent of data theft victims...

Read More
Busting the myth that the cloud is less secure
Mar24

Busting the myth that the cloud is less secure

Despite its recent popularity, the cloud is often misunderstood. In fact, to a lot of people, storing information in the cloud means that files are floating around in an empty space, free for hackers and other nosy people to grab. This misconception prevents many businesses from taking advantage of the wide range of capabilities the cloud has to offer. It’s time to “bust the myth” that the cloud is somehow less secure than traditional...

Read More