Posted by Lindsey Mink

June 20, 2018 | 10:30 AM

The start of the .sucks era changed the way companies viewed negative domain names. With the development of the .sucks era came a new outlook on negative domains and a fear associated with their possible usages. The debate on whether anyone should be allowed to buy a company’s negative domain names was controversial as some though anyone should be allowed to buy a negative domain name to use to express their opinions and give companies constructive criticism. Many business owners felt the opposite, fearing the intentional and unintentional harm negative domain names would cause their companies.

Read More

Topics: eCommerce, security

Is Your eCommerce Site Secure?

Posted by Hannah Gierosky

December 4, 2017 | 10:30 AM

One of the most important parts of running an eCommerce site is ensuring that your site is a safe place for customers to browse and make purchases. One way to work towards that security is to use Secure Sockets Layer technology, or SSL.

Read More

Topics: security, eCommerce

Magento Security Scan Tool

Posted by Hannah Gierosky

November 13, 2017 | 10:30 AM

As everyone with an eCommerce site knows, security is of the utmost importance. Keeping your customer’s sensitive information secure is crucial for instilling trust and keeping your overall site secure will help keep it as efficient as possible. Magento recently announced a new tool to help keep users’ sites secure: Security Scan.

Read More

Topics: Magento, security

IBM i + Syslog Format

Posted by Rob Nettgen

November 8, 2017 | 10:30 AM

As we’ve mentioned before, IT security on IBM i should be a high priority for anyone running the platform, despite its reputation as a traditionally “safe” environment. And while IBM i is a relatively safe platform, we need to change our mindset around IT security from IBM i being the “most secure” platform to the “most securable” platform.

Read More

Topics: IBM i, security

It's Time to Take Security Seriously on IBM i

Posted by Bill Onion

June 7, 2017 | 10:30 AM

One of the most significant benefits of IBM i is that it is traditionally viewed as a safe platform; you can’t hack it, you can’t break it, and there has never been a recorded virus. But as cyber-attacks become more and more commonplace, IT security needs to become a higher priority for everyone, including those running the seemingly impervious IBM i.

Read More

Topics: IBM i, security

How to Avoid Falling Victim to 5 Common Social Hacking Methods

Posted by Nick Pierce

February 15, 2017 | 10:30 AM

What is social hacking?

"Social hacking describes the act of attempting to manipulate outcomes of social behavior through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission." - Wikipedia

Read More

Topics: Technology, security



Subscribe to Email Updates

New Call-to-Action

Contact Us


Recent Posts