Blog
Sage Is Latest Company To Report Internal Data Breach
Sage, LLC, a British company providing business software solutions for clients around the world, was the latest victim of a data breach. This one, however, came from inside the company itself. This is an increasingly common problem, though not as widely reported as the high profile data breaches from hackers outside the company’s firewall. One […]
90 Percent of People Ignore Important PC Security Warnings
What do you do when you get a popup window generated by some piece of software you use, informing you of a critical update? Do you stop what you’re doing right then and perform the needed update? Most people don’t, according to recent research. In fact, a full ninety percent of users simply close the […]
Ransomware Heavily Targeting Health Care Companies
You’ve probably seen the headlines. This year, hardly a week goes by that there isn’t a report of a company in some way connected to the health care industry falling victim to ransomware. If you think it feels like they’re being specifically targeted, you’re not imagining things. According to the latest research by FireEye, hackers […]
New Tech Can Copy And Mimic Your Handwriting
Researchers at University College London have created a fascinating algorithm that can take a sample of hand-written text, and imitate it with eerie similarity. At first glance, that might seem like a silly, or even trivial thing to spend time on, but make no mistake. The problems being solved here are far from trivial. As […]
Adobe Flash May Soon End On Google Chrome
Adobe’s beleaguered Flash player may finally be seeing its last days, at least if Google has anything to say about it. The player has been exceedingly popular, and at its peak, a vast number of websites relied on it heavily to display content and advanced features to website visitors. Unfortunately, in recent years, a number […]
App From Microsoft Creates Better Two-Factor Authentication
Microsoft is a company that definitely understands the need for better and more secure information systems. Like many other tech companies, they’ve been pushing hard for two-factor authentication protocols covering large swaths of their online ecosystem. Unfortunately, their approach has been rather messy and unfocused. They’re attempting to remedy that situation by announcing the rollout […]
New Chip Cards May Not Be As Secure As Expected
Remember not long ago, when the big credit card issuers went on at some length touting their latest advances in smart chip technology? The new tech was supposed to vastly improve the security of credit cards, rendering them virtually immune to hacking. Well, it turns out that might have been a bit of an overstatement. […]
Watch Out for Windows Activation Scams on Your PC
There have been a number of scams in recent years involving malware that creates false flag problems on your desktop. The faux problem is presented, along with a phone number you can call to get help resolving the issue. Consider this a kinder, gentler form of ransomware. Because it all looks very official, and the […]
New Business Card Interacts With Mobile Devices
Printing company MOO Labs has just brought the humble business card into the information age. Employing the same NFC (Near Field Communications) technology that makes it possible to make a credit card purchase without actually having to swipe your card, the new MOO Labs business card takes the technology in a whole new direction, and […]
HIPAA Violations Are Turning Into Prison Sentences For Some
The unfortunate reality is that most instances of hacking occur from within a company itself. It’s true that the high profile cases that make the news are successful breaches from outside the company, but the statistics bear out the fact that this is less common than internal breaches. Recently, an employee of Tampa General Hospital […]

A Visionary Approach to Your Security
The purpose of an IT partner isn’t just to fix something when it is broken, it is to keep your people working and your data secure. Astral moves beyond traditional managed services by addressing all the key areas of cybersecurity in today’s complex landscape.

