Blog

Blog
What is Phishing?

Malware. Clone phishing. Whaling. Phishing comes in many forms, and all could be taking place this very minute. It’s become the most common form of

Blog
What is Identity Theft?

It’s a fact that in 2016, identity theft was the fastest-growing crime in America. Phew. That pushes murder and robbery down the list. But identity

Blog
Ransomware Could Mean Life Or Death

The smaller your company is, the more prone it is to being hacked with ransomware. It may seem unlikely, given your revenue or less intimidating

Blog
Link High Helps City Revamp Its IT

Link High Technologies Succeeds Where Other Tech Consultants Failed THE CLIENT Montgomery Township was originally established in 1702, long before anyone needed IT support. Located