Blog

How Long Before You Experience A Cyber Attack?

According to this year's Traveler's Risk Index, published by The Traveler's Indemnity Company, a majority of business owners have a somewhat fatalistic view of hacking and data breaches. The index […]

Firefox Adds Data Breach Monitoring Service 

Firefox is upping the ante where digital security is concerned, having just announced the release of a new, free service called 'Firefox Monitor.'  The new service is designed with one […]

Windows 10 Adoption Continues To Grow 

Windows 10 is far and away the fastest growing version of the OS in the company's history.  It recently hit an installation base of a staggering 700 million devices after […]

Government Payment Processor Exposes Data On Millions Of Americans

If you use the GovPayNet portal, be advised that your personal information is currently at risk. Although at this point, there's no indication that any hacker has made use of […]

Google’s Emergency Location Service Improves 911 Response

Google is making a small but pivotal change as it relates to calls placed to 911 operators.  Having recently finalized a complex partnership with RapidSOS and West (two emergency technology […]

G-Suite Users Can View Employee Productivity With Work Insights

Google has recently made some changes and improvements to its G-Suite. It introduces new tools designed to allow managers and admins greater visibility into how the people in their organizations […]

Android May Be  Coming To More New Cars Soon

Google scored a major coup in the auto industry. They just inked a deal that will put the Android OS in every car made by the global auto alliance Renault-Nissan-Mitsubishi. […]

Data Breach Notifications May Get Standardized

A new piece of legislation is making its way through the halls of Congress that could standardize and streamline the data security and breach notification process for financial institutions. This […]

An Exploited Website Can Cause Apple Products To Crash

Users of Apple tech have a new reason to worry.  A security researcher named Sabri Haddouche, who works for an instant messaging app called "Wire," has published a proof of […]

Popular NAS Device May Easily Be Compromised

Western Digital has a big problem, and if you use the company's "My Cloud" network-attached storage (NAS) storage devices, you've got one too.  The WD My Cloud service is enormously […]

Contact

Sterling Networks
2277 Townsgate Rd, Ste 208
Westlake Village, CA 91361

Phone: (805) 579-8998
Email: info@sterlingnetworks.net

Social Media

Facebook Google Plus Twitter LinkedIn YouTube RSS