5G security issues? Are you ready?

On our Newave Facebook page, we recently shared a video about 5G networks, and the IT staff is buzzing with concerns. Why? Because Newave experts are already aware of the 5G security vulnerabilities in this emerging technology. The current concern with 5G networks is authentication security. A Cornell University analysis abstract states, “we find that some […]

The Biggest Phish Story of 2018

Just this month, the FBI warned that there was a 60% increase in 2018 in fake email schemes that aim at stealing money or tax data. Phishing attacks aren’t new, but the realization of the impact to business infrastructure and economy is wide reaching. Integrity in marketing and specifically email communication is at the center […]

Boost Your Employee’s Cybersecurity Training

While cyberattacks remain the no. 1 business risk in North America, only one in four employees are aware of the most common cyber security threats—including phishing attacks, ransomware, and impersonation—according to a Wednesday report from Mimecast. The report surveyed more than 1,000 employees who operate company-issued devices to see how much employees know about cybersecurity […]

What is the Section 179 Deduction

  What is the Section 179 Deduction Essentially, Section 179 of the IRS tax code allows businesses to deduct the full purchase price of qualifying equipment and/or software purchased or financed during the tax year. That means that if you buy (or lease) a piece of qualifying equipment, you can deduct the FULL PURCHASE PRICE […]

6 Most Popular Cyberattack Methods

Are cyberattacks really a problem? Is it just hype? – No, it’s not just hype; and here’s why…   Cyberattacks are on an increase this year.  According to a report by Positive Technologies, Q2 2018 demonstrates a startling increase by 47% in cyberattacks over Q2 2017. The six most common cyberattack methods criminals used in […]

Is Your Mobile Device Management Policy Right for Your Company and Your Employees?

  MDM stands for Mobile Device Management, and your office may have a policy in place already. MDMs help a business control available resources, internet bandwidth, and protect against virus and malware transmission.   While businesses are ready to implement MDM policies for employees to opt-in to with their personal mobile devices (phones, laptops, tablets, […]

3 Reasons Why Businesses Need Help Desk Services for IT

From network outages to online security threats, tech problems can end up costing businesses a great deal of time and money. While larger companies may defend themselves against these dangers by hiring internal tech specialists, smaller businesses may not always have the resources or need to create a dedicated IT staff. Fortunately, these organizations can […]

Virtual Reality on the Verge of a Breakthrough

Virtual reality (or VR) has been featured in science fiction for decades. After several failed attempts to commercialize the technology in the 80s and 90s, VR is finally on the verge of a major breakthrough. The VR industry has benefited from more and more powerful computers, the shrinking size of electronics, and huge multi-billion dollar […]

Guidelines to help keep your children safe online

As an adult, it’s a struggle to stay secure online—creating strong passwords, maintaining a basic knowledge of malicious online content, and knowing what to post and what not to post on social media accounts.  As a parent, this struggle can become almost impossible.  At this point, you’re not only trying to keep yourself secure, but […]

How Does Encryption Work?

Information security is provided on computers and over the Internet by a variety of methods, but the most popular form of security relies on encryption. So what’s encryption? It’s the process of encoding information in such a way that only the person (or computer) with the key can decode it. Nowadays, it’s easy to buy and sell goods all […]