Pearl Technology Blog

Continuing the Password Conversation

Posted on 10/25/2016 by Pearl Technology in Cyber Security Passwords

Because passwords are your first and often only line of protection from would-be hackers, the security community can never talk about them too much.

read more..

Addressing the Cyber Arms Race

Posted on 10/23/2016 by Pearl Technology in Cyber Security Malware

The cyber arms race is ugly. Even though new technology creates positive changes, it also falls into the hands of thieves. Malware, phishing, social engineering, and cyber attacks have proven to be incredibly lucrative.

read more..

Secure Your Information On Social Media

Posted on 9/26/2016 by Pearl Technology in Cyber Security Social Media

Social engineering happens when an attacker exploits social media information in an attempt to gain trust from a victim.

read more..

Fight Malware With Data Backup

Posted on 8/30/2016 by Pearl Technology in Malware Backup Data

There is a particularly nasty family of malware out there known as ransomware. It goes by names like Cryptolocker, Cryptowall, and a REALLY awful one known as MBR ransomware.

read more..

Kick Flash Out of the Nest

Posted on 7/26/2016 by Pearl Technology in Cyber Security Flash

Adobe Flash was a fantastic program in the 90s and early 2000s. It empowered users to create fantastic, original content. But like a child who refuses to leave their parents' house, Flash has overstayed its welcome.

read more..

Don't Cancel That Task—Install the Updates

Posted on 6/8/2016 by Pearl Technology in System Updates Flash Java

You boot up your computer, and it happens again. A prompt pops up and asks you to install important system updates. Instead of clicking "remind me later," install those updates!

read more..

Throw Out Your Flimsy Passwords

Posted on 5/10/2016 by Pearl Technology in Cyber Security Passwords

If you were building a new house, you wouldn't frame the walls with cardboard. You wouldn't install floors made out of Styrofoam and bubble wrap. If you use short, simple passwords, you're guarding your files and sensitive information with flimsy security.

read more..

5 Steps to Protect Your Mobile Devices

Posted on 2/18/2016 by in Cyber Security

Are you reading this blog from a smart phone or tablet? Do you check your personal or business email on a smart phone or tablet? If you answered "yes" to either of these questions, you should continue reading and take the necessary steps to ensure the security of your mobile devices.

read more..

Stay Safe While Surfing

Posted on 2/18/2016 by in Cyber Security

Think of your workplace as a beach. If you want to stay safe while surfing, you need to avoid sharks. These cunning beasts will wait until you're not paying attention, and then LOOK OUT! Cue the Jaws theme.

read more..