Milwaukee IT Services Blog

where Milwaukee goes for technology information

 

The newest generation of wireless connectivity has been a major topic of discussion in 2020; WiFi 6 and 5G are being touted in marketing pitches for consumer and enterprise products alike. But what really makes these newest generations sp...

At the RSA security conference the last week of February, Microsoft engineers said that 99.9% of the compromised accounts they track every month don’t use multi-factor authentication, a solution that stops most automated account attac...

Proactive cybersecurity is critical to ensure that an organization’s devices and data are protected from the wide array of threats that are growing by the day. Since 2013 there are approximately 3,809,448 records stolen from breaches ever...

Bluetooth is used in everything from speakers to implanted pacemakers, which means that Bluetooth-related vulnerabilities can affect a dizzying array of devices. In the latest instance, a newly discovered round of 12 Bluetooth bugs pote...

Cybercrime is evolving. Do you remember back when our biggest fear was that our computer would get a virus? Fast forward ten years later, and that’s the least of our concerns. Today, there are trillions of cybercriminals out there that ha...

Kirsten Gillibrand, the US senator for New York, released the call to action last week. She announced draft legislation known as the Data Protection Act on Thursday, February 13, a day after explaining her reasoning in a post on Medium...