Security
What’s New in CMMC 2.0 | Key Changes for Government Contractors
Without obtaining the DoD’s new CMMC 2.0 certificate, businesses in the manufacturing, law, and finance industries will soon find it difficult to win contracts with federal agencies. Here’s how a proactive stance on cybersecurity can help bring in more revenue.
Read MoreOwl Labs Videoconference Device Poses Security Risk | Sync Up
You’d expect that topics discussed behind closed doors would stay private, right? Well, if you have videoconferencing tech by Owl Labs in the room, think again as many of its cameras have been found to expose sensitive data online.
Read MoreTesla Bluetooth Hack Can Unlock & Steal Your Car | Sync Up
Own a Tesla? You might want to check your driveway to see if it’s still there as hackers now have a new way to unlock and steal these cars from miles away. We’ll not only look at how this crime occurs, but also give you a simple means to protect your Tesla as we sit down and sync up with Rocket IT’s weekly technology update.
Read MoreGoogle Launches Virtual Credit Cards to Keep Your Real Ones Secure | Sync Up
Credit card fraud has increased 161 percent in the last five years. Now, with Google’s announcement of virtual credit cards, shoppers will soon have a more secure way to purchase items online.
Read MoreWill Passwords Ever Go Away? Apple, Google, & Microsoft Think So | Sync Up
Struggle to remember your passwords? Say goodbye to those mental blocks as Apple, Google, and Microsoft are uniting to launch a concept known as passwordless login.
Read MoreWas Coca-Cola’s Recipe Stolen? | Hackers Claim a Data Breach | Sync Up
Ever wondered what’s included in Coca-Cola’s top-secret recipe? While it’s likely the world will never know, the soft drink giant is currently investigating claims of a breach that potentially compromised sensitive business information.
Read MoreLinkedIn Becomes Most Impersonated Brand in Phishing Scams | Sync Up
Receive an unsolicited message on LinkedIn? Chances are it could be a scam as LinkedIn is now the number one brand impersonated in online phishing scams.
Read MoreAre You Really Muted in Video Conferencing Apps? | Sync Up
A new study found that muting your mic in a video conference call does little to prevent most apps from secretly recording your voice.
Read MoreVerizon Customers Receive Spam Texts From Their Own Numbers | Sync Up
Over the last week, millions of Verizon customers have received suspicious looking text messages that appear to come from their own phone numbers. But who’s sending these texts, why do they come from your own number, and is it safe to click the included link?
Read More