Blog
Latest Technology News from SemTech
3 Ways Email Encryption Keeps Your Messages Safe
Encryption is a very important tool in today’s business environment, especially if you are trying to protect your email communications. Today, we’ll discuss the benefits of using encryption for your business’ communications solutions, but without an understanding of what encryption…
Read MoreThe Internet of Things Continues to Expand
The Internet of Things is now made up of over 15 billion devices. 15 billion. This number includes both consumer devices in a home environment as well as business devices that are typically used in an office setting. As such,…
Read MoreWould You Fall for this Adult Scam if You Saw an Old Password?
As you may expect, the average Internet scammer isn’t above resorting to dirty tricks to claim their ill-gotten prize from their victims. A recent scam demonstrates just how dirty these tricks can truly be, and unfortunately, how ill-prepared many are…
Read MoreSave Money, Be Spied On?
Although we’re in the habit of discussing ways to keep your business more secure, we unfortunately have to discuss how to keep yourself more secure against a business. Walmart recently filed a patent that could potentially be used to undermine…
Read MoreThe Blockchain May Soon Protect Your Entire Identity
Blockchain is one of the latest and greatest developments to come in computing. The spotlight is on Bitcoin, Ether, Litecoin, Dogecoin, and several other cryptocurrencies that take advantage of the blockchain, but it’s important to remember that it’s not exclusive…
Read MoreHow to Avoid the Pitfalls of Public Wi-Fi
Someday, you’re going to encounter a situation where you absolutely need Wi-Fi and the only option will be a public connection. This becomes rather problematic, as a public Wi-Fi connection is far from secure for business purposes. A method to…
Read MoreAt What Point Does a Service Become Spyware?
Spyware, like other malware, is a problem for any organization. Since your business generates, collects, and uses considerable amounts of data, there are plenty of organizations that want to get their hands on it. You spend so much time and…
Read MoreLinks Discovered Between WannaCry and North Korea
In a statement given by Tom Bossert, the homeland security adviser to the White House, blame for the WannaCry attacks leveraged from May 12th to the 15th in 2017 was attributed to the Democratic People’s Republic of Korea. This assertion…
Read MoreCredit Card Theft and Identity Theft are Not the Same Thing
While many might see having a credit card stolen as identity theft, this is an oversimplification that can prove dangerous. While credit card theft can be an element of identity theft, equating the two means that other forms of identity…
Read MoreGoogle Is Becoming More Secure for Certain Users
Google is taking steps to protect the data of a small group of its users who run the highest risk of experiencing a data breach or hack. This new service, the Advance Protection Program, shows promise in protecting the information…
Read More