encryption | Blog Category

Technology Articles from MPA Networks

MPA Networks, Inc. Launches Secure WiFi-as-a-Service to Protect Customers from Cyber Attacks

November 6th, 2019 by admin

Hooded hacker touching a screen with green text

SAN MATEO, CA – MPA Networks, Inc., a leading managed technology services provider (MTSP), announced today that the company has launched a Secure WiFi-as-a-Service program to protect its customers from cyber attacks through wireless access points....

Read Full Story »

Posted in: Press Release

MPA Networks, Inc.’s Cyber Security Technology Helps Local Businesses Protect Their Networks Against Global Attacks

June 12th, 2019 by admin

Password protection security

SAN MATEO, CA – May 2019 – MPA Networks, Inc., a leading managed technology solutions provider, helps local businesses protect their networks against growing global attacks. The company’s state-of-the-art cyber security technology and defense...

Read Full Story »

Posted in: Press Release

MPA Networks Knows Security

January 29th, 2019 by admin

Lock

Your business needs a dependable and robust cybersecurity solution, plain and simple. As technology continues to advance and new threats are coming to the forefront, it is essential to have the proper security and management behind you to ensure...

Read Full Story »

Posted in: Cyber and Data Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Hardware and Software

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

Clip art of a hand holding a bag with a dollar sign on it, in black and white

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned...

Read Full Story »

Posted in: Cyber and Data Security

Email Encryption: The Basics

November 12th, 2015 by admin

Stylized depiction of a blue postcard stamped 'PRIORITY'

Chances are you probably have a few USPS "forever" stamps that have been sitting in your desk drawer for a while. When was the last time you actually used them to "snail mail" something—a bill payment or an important letter? Most bills are paid online...

Read Full Story »

Posted in: Cyber and Data Security

Lessons of Ashley Madison: How “Crackable” Are Your Passwords?

October 20th, 2015 by admin

Close up of a keyboard with one key labeled 'safe' in red and blue

The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the...

Read Full Story »

Posted in: Cyber and Data Security

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

Black calculator sitting on a sheet of data, next to an uncapped silver pen

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover...

Read Full Story »

Posted in: Cyber and Data Security, Solutions