[vc_row][vc_column][vc_column_text] This week, the U.S. Department of Homeland Security suffered a major data security breach. A hacker released the names, contact info, and job titles of over 9,000 DHS employees. And they said they plan to release the same critical...
Data Security
Java: Innocent Plug-In or Data Security Risk
[vc_row][vc_column][vc_column_text]Java, a pre-installed plug-in on many pc's, is causing data security concerns for users. Like so many programs, Java requests to be updated on a regular basis; which many people ignore. As reported by the BBC, research by the FTC has...
Is Your Small Business Making These 5 Technology Mistakes?
[vc_row][vc_column][vc_column_text] As a small business owner, you wear many hats. From IT director to marketing coordinator to lead accountant, your job requires you to do it all. But when it comes to technology, a lack of experience can lead to pitfalls or setbacks...
What’s Holding Back The IT Support Industry?
Few industries have experienced greater periods of rapid change than IT support. Even as recently as twenty years ago, most employees didn't have access to a computer, and data security was seen as storing and destroying paper documents correctly. Now, almost every...
Physical Security is Crucial to Your Data Security
[vc_row][vc_column][vc_column_text] We write about data security in our blog posts often as it is a topic that goes hand in hand with any IT Support discussion. One aspect that often is overlooked is the actual physical security of your serves and systems. Having a...
Data Security: Can Hackers Take Control of Your Products & Equipment?
Could you imagine what would happen to your manufacturing company if a hacker took over your control systems? It happened to a German manufacturer. The company could not shut down their blast furnace. The damage, according to a report by Wired, was massive. The...
4 Features Of Office 365 That Will Help Jumpstart Your Small Business
[vc_row][vc_column][vc_column_text]As Microsoft prepares to end support and updates for its Small Business Server 2003, many professionals are exploring the cloud-based Office 365 as a potential replacement. The idea of switching from a platform with which you are...
Rombertik Identified by Cisco as a New Suicide Virus
[vc_row][vc_column][vc_column_text] Rombertik is a new malware that is making data security headlines, as it collects everyday data you may enter into websites. It specifically targets collecting the data that users type in fields on websites, such as usernames,...
2015 Data Security: The Rise of Hacking Campaigns
[vc_row][vc_column][vc_column_text]Even though technology makes it harder for criminals to do their work, it’s not bullet-proof. In fact, there are many criminals equally as innovative as their private industry counterparts. So they’re fast at developing new methods...
5 Antivirus Mistakes You’re Making Right Now
[vc_row][vc_column][vc_column_text]Once you get an antivirus program, you can totally forget about it, right? You don’t have to do a single thing more because the program does all the work for you…Well, yes and no. Antivirus does protect you so you don’t have to guess...