CTTS, Inc.

Blog

Apple IOS12 Users’ Photos And Contacts May Be Vulnerable

Jose Rodriguez, a Spanish Apple enthusiast, has discovered a new security flaw to be aware of. He posted a Proof of Concept video showing the exploit in action.  We'll say upfront that ...

The Differences Between Sync, Backup, and Storage

The cloud is a great solution for your business’s file management needs, but depending on your specific situation, you’ll ...

Microsoft Is Changing How Searches  Will Work

Change is coming to the way Microsoft handles search across its ecosystem.  If you use the home edition of Office, you're not likely to notice, but if you use Office 365, the ...

Google May Be Getting Rid Of Google Plus

If you're one of the relatively few people who use Google+ in something other than an Enterprise setting, be advised that the clock is ticking.  Google has just announced that they're sunsetting ...

Your Business Can Use HaaS

Just like how your organization relies on hardware solutions to keep operations moving, this hardware relies on ...

Payment Pages Are Being Compromised To Steal Data 

Symantec's most recent statistics have revealed a disturbing trend.  Malware designed to compromise checkout pages is seeing a big spike in use, with the company reporting a staggering 248,000 attempts since August ...

Someone’s Trying To Phish You… Do You Play Along?

Phishing scams have been popping up for years--their most infamous attack vector has even become a punchline: some long-lost ...

How Long Before You Experience A Cyber Attack?

According to this year's Traveler's Risk Index, published by The Traveler's Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index includes 52 ...

Firefox Adds Data Breach Monitoring Service 

Firefox is upping the ante where digital security is concerned, having just announced the release of a new, free service called 'Firefox Monitor.'  The new service is designed with one specific goal ...

2 Sneaky Ways Hackers Will Rob You Blind

We’ve said it before and we’ll say it again: cyber-attacks aren’t limited to big corporations and government organizations. Verizon’s 2018 Data ...

Contact

CTTS, Inc.CTTS, Inc. Logo $$$
  • 557 S. Interstate 35
    Suite 201

    Georgetown, TX 78626
  • Phone: (512) 388-5559
  • Phone: (512) 388-5559

Technology Tips

Protect your business from the latest threats with our weekly Tech Tip Tuesday articles, written by our own Team of experts!

Sign Me Up!