CALL US TODAY:
888-462-0044

Open/Close Menu INNOVATIVE IDEAS for INTELLIGENT INTERACTION with INFORMATION

WANT TO TAKE A TEST DRIVE?
TRY A FREE DEMO »

CALL US TODAY:
888-462-0044

In 2013, the worst cybersecurity intelligence breach in U.S. history happened. The target of the hack was the White House Office of Personnel Management (OPM). In today’s atmosphere of fear over data breaches and email hacks, what’s being done to protect the sensitive personal data housed in government networks? What lessons have we learned from…

Don’t be worried…at least, not yet. Though it is true that it’s entirely possible you had a role in a widely-reported criminal act. No need to call a lawyer…for the moment. Even though, Though it is true that it’s entirely possible you had a role in a widely-reported criminal act. No need to call a lawyer…for…

So… you have a new friend, or a new person you are dating, maybe even a new co-worker.  Who among us hasn’t used the internet to do a little online vetting of a person? Sure, you might not advertise the fact that you did it. But there’s a difference between searching and stalkingonline, right? And…

Propaganda is defined by dictionary.com as: information, ideas, or rumors deliberately spread widely to help…a person, group, movement, institution, nation, etc. Now let’s give credit where credit is due. When it comes to propaganda, North Korea is second to none. Just check out what mighty leader Kim Jong-un has been up to lately:    …

A new study out of Canada says the odds are that your wearable tech device (like a Fitbit) is leaking personal data in unexpected places. Eight popular wearable devices were tested by Citizen Lab and the Munk School of Global Affairs:  Apple Watch; Basis Peak; Fitbit Charge HR; Garmin Vivosmart; Jawbone Up 2; Mio Fuse;…

Headlines about data theft, cyber-attacks, and the importance of protecting your data are everywhere. You probably try to keep up to date with the most recent security products and malware detectors, doing everything in your power to protect your sensitive information. But what about the companies and service providers with whom you interact? How well do…

Websites being attacked by hackers is nothing new, but business owners may underestimate the scope of the problem: a recent Nielsen study indicated a healthy majority (57%) of online consumers do not believe that e-commerce websites will keep their personal data secure. And small wonder with the rate of cyber chicanery continuing to grow:  A…

In case you haven’t caught all the details of The Panama Papers, here’s a recap: What are the Panama Papers? The Panama Papers is the name given to the  largest data leak journalists have ever encountered:  2.6 terabytes of data consisting of 11.5 million files. Where did they come from? The records came from the…

It was the salvo heard round the tech world:  United States Magistrate Sheri Pym ruled that Apple must write code to assist the FBI in breaking the code protecting an iPhone.  But this is not just any iPhone— it’s the device that belonged to one of the San Bernardino shooters. Apple has so far refused to…

If you’re planning on visiting the campaign site for Jeb Bush, you may be in for a surprise. Although most users might assume the former Florida governor’s official campaign website would be his name – JebBush.com – they would be wrong. The correct answer? Jeb2016.com.   Using Jeb’s full name will bring you to a surprising…

© 2015 5i Solutions Inc.

Thynks Web Design and Marketing