On April 7th, a new bug on the Internet was discovered that's putting millions of users' personal data at risk. Given the name "Heartbleed bug," it's capable of allowing infiltrators to collect information while you are securely browsing a SSL/TLS website. Since SSL/TLS is so widely used, it's very probably that your personal data is at risk.

Published in IT Blog
Friday, 04 April 2014 06:47

The Only Good Virus is No Virus

This world is dangerous; there are murderers, serial killers, and identity thieves. These dangerous criminals aside, many people ignore the digital world and find solace in thinking that they are untouchable in their online community. Little do they know, some of the most dangerous criminals in the world exist on the other end of a telephone line, sitting in front of a computer: Hackers. One of the easiest ways to shield yourself from these criminals is to keep your antivirus up to date.

Published in IT Blog

If you've ever had your smartphone stolen, you can attest to the frustration and potential risk that it brings. Many organizations and legislators are working to muzzle the issue, and there are steps that you can personally take to help prevent your device from being stolen. Let's take a look at how to prevent smartphone theft, and how to respond if your gadget is stolen.

Published in IT Blog

You're likely familiar with the various ways that hackers can steal your identity, but you may not be familiar with how hackers anonymously buy and sell people's personal information to interested parties. This is done through online ID theft services and a December hearing before the U.S. Senate highlights how one service was selling personal records on more than 200 million Americans!

Published in IT Blog

In the business world, it's common knowledge that Microsoft is ending support for its popular operating system Windows XP on April 8. However, with recent data showing that 29% of the world's computers are still running Windows XP, it appears that the rest of the world is slow to act upon Microsoft's expiration date.

Published in IT Blog

Before the XXII Olympic Games in Sochi, Russia, there were concerns from several influential entities about the data security at the Olympics. These concerns were reported leading up to the games and on the eve of competition, the NBC Nightly News with Brian Williams ran a story by reporter Richard Engel that intimated that visitors to Sochi were immediately being hacked when they signed into the public WiFi accounts provided to athletes, media, and guests of the games.

Published in IT Blog
Wednesday, 05 March 2014 07:24

Thieves Want Your Backup Data

Are you aware of the value of your company's data? If you lost it all today, what would it cost your business in terms of productivity, downtime, and liability? Security precautions need to be taken in order to keep your data safe, including data backups. However, after you have a backup system in place, don't neglect the need to secure those backup files!

Published in IT Blog

As thousands of athletes descend upon Sochi, Russia for the Winter Olympics, they will not only be competing against each other for the gold, but they will also be competing against hackers for the security of their personal data. What can we learn about network security from the Winter Olympics?

Published in IT Blog

Sometimes, when complex systems are put into place, the simplest and most fundamental tasks seem to be neglected. Updating your business' software should not be avoided. Software updates help secure your network and provide your company with an extra competitive edge. Don't risk your company's strengths by neglecting your software updates!

Published in IT Blog
Wednesday, 29 January 2014 07:17

What do Hackers Want with Your Email?

The value of your email account cannot be understated. You may think less of your email inbox because there are so many other ways to digitally communicate, but to a hacker, your email is a goldmine of valuable information. You may use your email less than ever before, but that doesn't mean you can neglect email security.

Published in IT Blog
«StartPrev12345678NextEnd»
Page 1 of 8
IBM Business Partner Badge Microsoft Badge ConnectWise Badge SonicWall Badge