As smartphone ownership continues to rise (175 million cellphones sold last year in the US), so too does smartphone theft. Take San Francisco, CA as an example, half of all robberies reported last year were phone-related. To help curb this trend, crime fighting agencies are seeking help from phone manufacturers in developing a smartphone kill switch.
May 4th is Star Wars Day (May the fourth be with you). In celebration of our favorite space saga, we thought that we would write about our dream job; providing IT support for the mother of all technologies, the Death Star from Star Wars.
You know that having a strong firewall is a key component to having strong network security, but do you how firewalls work? Firewalls take their name from the protective barriers that keep buildings and engines safe from fire. While it’s unlikely that your computer is in danger of incineration, a firewall does protect it from cyber-threats; here’s how!
What do hackers look for when choosing a victim? While there are hackers out there that specialize in targeting high-profile companies and executives (a hacking method call whaling), most hackers do a broad sweep of the Internet and choose the easiest targets. If your company has weak network security, then you have a target on your back.
The Internet has given us many new and exciting ways to transact business. The newest frontier is in regards to a virtual currency called Bitcoins that is unregulated and accepted by Internet users worldwide. Bitcoins may be too much of a novelty for your business to take seriously, but that does not discredit it as an interesting investment opportunity.
As an IT company, we get excited about the newest computer hardware and software. We try to convince everybody that upgrades are great, but some people cannot be shaken from their devotion to what is familiar and refuse to upgrade their tech. In our experience, here are the three biggest reasons why upgrades are avoided.
The Windows family of operating systems (OS) have different power-saving modes for users to take advantage of if they find themselves away from their workstation or mobile computing device. Windows 8 features three: Sleep, Hibernate, and Hybrid Sleep.
Microsoft will be dishing out multiple security updates this week, including four critical patches for Windows, Internet Explorer, Office, and SharePoint Server. Critical updates are considered Microsoft's highest threat rating, so installing these patches is important.
The largest and most important components of your network is your servers. Technically, you can line up your servers on a big table and they will work, but if you want to get the most out of your servers, then we recommend using a server rack.
Even if you are using the best antivirus software available, sensitive company data can still be compromised by users falling victim to phishing scams. Phishing is a tactic where scammers trick users into giving out their personal information, usually through deceptive spam e-mails. Looking to fry bigger fish, scammers are trying their luck at whaling.