The 2017 Equifax leak was a disastrous scenario, but recent revelations have discovered that even more victims were affected than was previously...
Reciprocal Technologies Blog Security • Page 31
Take These Steps to Make IT Security Top of Mind
Here’s the thing about IT security: it requires a little more than a decent firewall and a reasonably-strong password. We talk a lot about how to...
Why CPA Firms are in Danger of Being Hacked
The Internal Revenue Service has declared to tax professionals that they must take extra steps toward protecting the information of taxpayers....
Data Loss Can (and Will!) Affect Your Entire Business
Data loss, on any scale, is an organizational nightmare. Not only do you have to restore data, any lost productivity that comes as a result of the...
Have You Considered What You’re Really Losing When You Lose Your Phone?
Losing a smartphone can be a problem for anyone. For the modern business, it can really cause issues. Mobile devices are notorious for housing a lot...
Email Malware is the New Schrӧdinger’s Cat
There is a famous thought experiment devised by physicist Erwin Schrӧdinger, describing a very particular paradox in quantum physics through the...
When it Comes to Security, Two Factors are Better Than One
The password isn’t nearly as secure as it used to be. Hackers have begun to take advantage of extremely powerful solutions designed to brute force...
Is Your Mobile Device Safe from Malware?
Mobile devices are becoming more important in business use, which means that their security needs to be a serious consideration. While for most of...
Tip of the Week: Protecting Your Company from Invoice Impersonation
While you should be sure to keep yourself apprised of threats, it could be argued that it is even more important for your employees to be aware of...
Tip of the Week: Protecting Your Mobile Device in 2 Easy Steps
Mobile devices are one of the greatest tools available for business use today. However, because society has come to rely so much on mobile devices,...










