Don’t overlook your business printers’ security

Protecting your business printers from malicious cyberattacks may be the last thing on your mind, but it should definitely not be. Hackers are always looking for new vulnerabilities to exploit, and, if left unprotected, printer systems can offer a trouble-free gateway into vast troves of sensitive data.

3 Types of hackers: What you need to know

Hackers come from all different backgrounds. Some hackers are motivated by money and politics, while others simply hack systems for fun. In this blog post, we will define the three kinds of hackers and how each one differs from the others.
A complicated history
In the 1950s, the term “hacker” was vaguely defined as someone who explored the details and limits of computer technology by testing them for a variety of purposes.

IT security predictions for 2016

As shown by recent high-profile hacking scandals - targeting everyone from Sony Entertainment to the extramarital-affair-facilitating website Ashley Madison - cyber crime shows no sign of disappearing any time soon. In fact, experts predict that 2016 is going to be an even busier year for cyber criminals, hackers and scammers.