Blog

Risk … or Security? What Do You Really Mean?

Most companies approach security in the same manner. They create systems and strategies to stop, identify, or track an intruder so that they can halt or reduce the damage. Sounds like a good plan, right? Only in many ways, it’s ...

Insecure Apps Can Leave Your Smartphone At Risk

When was the last time you went shopping in your app store? There are so many things to consider. A time management tool to help you track your days. A photo tool to help you take better pictures. A game ...

Having Multiple Vendors In Your Cloud Strategy

For most business environments, it’s always been a shuffle of how to combine hardware and software to best accomplish your goals. You purchase equipment from one source, storage from another, services from third-party programs, and hope they all connect to ...

Even Information Officers Are In The Customer Service Business

Step back in time and businesses operated efficiently with separate divisions. Marketing, customer service, technology - they all played their part. But times have changed, and business integration has become more essential. Each individual department can no longer act on ...

New Technology Means New Threats

We’re a nation that loves new technology. Phones, tablets, laptops, and desktops are regularly upgraded, bringing us new ways of doing things. While we downloaded approximately 115 billion apps in 2016, that number is expected to reach 197 billion in ...

Identification vs Authentication - How Well Do You Know Your Employees?

Your business has certain security practices in place. You have a lock on the front door. You use passcodes to enter certain rooms in your building, or have access to data on your computers. You secure it in one of ...

Business As Usual - Until A Cyber Attack Happens

The Equifax data breach has topped the news for many days now. Of course, it’s only one in a long list of high profile companies that have been hacked in the last few years, releasing highly sensitive information to less-than-stellar ...

How To Protect Yourself From Hackers Hijacking Your Phone Number

Have you ever forgotten a password? Of course, we all have. It can be annoying, racking your brain trying to remember what credentials you used to login. But the solution is fairly easy to handle. With just a little bit ...

Protecting People's Fears About Hackers In Medical Devices

You receive a notice from your doctor, telling you the FDA is recalling your pacemaker because lax cybersecurity could allow your medical device to be hacked into, giving them the ability to run the batteries down, or even alter your ...

Contact

Silver Linings TechnologySilver Linings Technology Logo $$$