Blog

Five Tips to Prevent VoIP Eavesdropping

Five Tips to Prevent VoIP Eavesdropping

Eavesdropping is the intentional act of secretly listening in on a conversation, usually not for the best of intentions. Although today the act also includes VoIP telephone systems, it’s not a recent trend. As exemplified by the SIPtap attacks of 2007 and the Peskyspy trojans of 2009, cyber-criminals have had their eye on VoIP ever since it was introduced to the market.

Microsoft Word Bug: What You Need to Know

Microsoft Word Bug: What You Need to Know

Software developers and hackers are in a constant game of cat and mouse. When cyber-criminals find new security bugs to exploit, tech companies have to quickly release a solution that secures those vulnerabilities. Just this month, Microsoft released a patch to eliminate a Word exploit designed to steal user information.

Advice From a Failed Disaster Recovery Audit

Advice From a Failed Disaster Recovery Audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.