Latest Articles

BLOG

Wyze User Information Leaked Include Emails And Other Data

Wyze is one of the many manufacturers of consumer-grade smart devices. They recently confirmed that user data belonging to nearly two and a half million of its customers was exposed. The root ...

BYOD=Bring your own disaster?

BYOD = Bring your own disaster for multifamily? Workplaces today have changed. The modern leasing office extends beyond the working hours, beyond the leasing desk. Whether you are commuting to a property or corporate ...

New Updates To This Malware Made It More Dangerous

If you haven't yet heard of a malware strain called 'Predator the Thief', it's something that belongs on your radar. It first emerged as a threat in July of 2018, when it ...

Upgrade From Windows 7 Now To Avoid Security Risks

By the time you read these words, the last day for Windows 7 support has already come and gone. The date set by Microsoft has been well known to most Windows 7 ...

Landrys Restaurant Chain Latest Victim Of Credit Card Breach

If you're not familiar with Landry's, you're probably familiar with at least some of the restaurants the company owns. The company recently issued a formal 'Notification of Data Breach' in which they ...

New Hacking Method Looks Like A Locked Computer

Scammers have breathed new life into an old scam. For years, the old 'Law Enforcement Lock' trick has been used to cheat unsuspecting victims of their hard-earned money. The new wrinkle works ...

Support For Many Microsoft Apps Will Stop In 2020

The year 2020 looks to be interesting and exciting in a variety of ways, but it also will usher in a tremendous amount of change. If you're an IT manager, be aware ...

CES 2020: Multifamily Tech Review

CTS attended the 2020 Consumer Electronics Show (CES) in Las Vegas last week. It was a great opportunity to check out new tech amenities for our property management clients and also it was fun to just experience some REALLY cool ...

Multi-Factor Authentication (MFA)

All Two-Factor Authentication (2FA) is Multi-Factor Authentication (MFA), but not all MFA is 2FA. Multi-Factor Authentication works on the principle of using multiple pieces of secret information in order to verify ...

ISO Files Are Being Used To Deliver Malware

Researchers at Trustwave have observed a notable increase in the use of .ISO files to deliver malware. Hackers have relied on poisoned disk image files for years to deliver malware to their ...