Latest Company Updates & Industry News

January 15, 2018

Antivirus 101: Why we use ESET and think that you should, too.

Antivirus protection is important, but setting up essential security protocols can be complicated. We make it easy. What can you do to make sure that you’re protected? Read on.   New threats and attacks to computer security are constantly being reported by the major news agencies. Hackers are
January 11, 2018

Meltdown & Spectre

Microsoft’s Windows Meltdown patch will not protect your security, if your antivirus software isn’t compatible. Microsoft updated their support page to state that Windows computers will not be protected from security vulnerabilities unless their antivirus software is compatible with the Spectre and Meltdown patches.   Microsoft has been
October 26, 2017

Ransomware Is on the Rise. Here’s How to Safeguard Your Business

With the exponential rise of ransomware, it is critical that small businesses have a backup and recovery plan in place. This article provides five crucial points for business owners to keep in mind to protect their business, data and customers. Over the past few years, we’ve seen an
October 26, 2017

A step-by-step guide to backup strategy for small business

I’ve been in IT for over 20 years and spend much of my time rubbing elbows with IT pros that specialize in certain parts of the industry. So, when I talk a lot (and I do) about backups, there’s sort of an assumption that the IT pro I’m
October 23, 2017

Office DDE attack works in Outlook too – here’s what to do

In the last two weeks, Sophos researchers have kept an eye on a vulnerability in Microsoft’s Dynamic Data Exchange (DDE) protocol used to send messages and share data between applications. Yesterday, new developments revealed an additional dimension to this attack. Early on, we noted that attackers could exploit DDE to launch malware
October 22, 2017

Android getting “DNS over TLS” support to stop ISPs from knowing what websites you visit

A DNS (Domain Name Server) is what translates a website address from a URL that you enter to an IP address which your computer actually connects to. For example, when you type “www.xda-developers.com” into your browser, your computer queries a DNS which looks up and returns the IP
October 16, 2017

Krack: WPA2 Vulnerability

Microsoft & Unifi has already fixed the Wi-Fi attack vulnerability: Technology companies are starting to respond to a new Wi-Fi exploit affecting all modern Wi-Fi networks using WPA or WPA 2 encryption. The security vulnerabilities allow attackers to read Wi-Fi traffic between devices and wireless access points, and
Mysterious hacker in hoodie; represents problem solved by proper IT solutions for security
March 6, 2017

Top 5 signs you got hacked

We live in a digital age that offers many possibilities and connections throughout the web. However, not all of these connections are good ones. Unfortunately, cyber criminals plot to break into your accounts and information by means of hacking. They use many tricks and devices in order to
email security
February 20, 2017

Tips on Small Business Email Security

There are two main areas to consider when it comes to email security. These are security in transit and security at rest. An additional concern is identity validation. It is very important to make sure that your customers trust the email you send to them. A little IT
windows 10 logo
February 6, 2017

How Microsoft is Improving Windows 10 Security

Microsoft’s Windows 10 security improvements have had people become critical of the company’s network security efforts. Users have become concerned about corporate spying.  According to Microsoft, they are not collecting users’ personal data. Instead, they anonymize file data that is used to enhance the comprehensive experience of users
business continuity plan
January 23, 2017

Protecting Your Network From Viruses

Having a server-based network means it’s very important to protect your server from viruses, hackers, and other malicious software. Once your server is compromised, the safety and security of your company’s whole network and all of its data can be jeopardized.  IT maintenance and network security is therefore,
January 6, 2017

3 Internet Browsing Tips to keep you Safe from Hackers

Are you the type of person who uses the same password and username more than once for all accounts you have online? Or shamelessly post all of your personal information online without thinking about all the possible dangers? If so, don’t make the mistake, because this can cause
December 19, 2016

Why Your Business Needs a Disaster Recovery Plan

A BDR (backup and data recovery) plan is essential for any business. If a business does not have one in place, there are risks the company will be taking. Knowing the benefits of such a plan is the only way an enterprise can see its importance. Protects Against
IT maintenance
December 2, 2016

5 Essential PC Maintenance Tips

All PC’s need to be maintained at one point or another. Since computers have become common, most people know basic maintenance tips. Things such as regular cleaning, updating the computer and defragmentation are known by many users. What’s less common is knowledge of essential IT maintenance. Here are 5 IT
hacker security
November 18, 2016

The Importance of Network Security

Security in a network is important as it protects everything in the network. Usually, attacks on a network may cause the systems to fail or become unresponsive. The following are some attacks that can be prevented with a good network security system. Unstructured Attacks These are attacks done
cyber security
November 4, 2016

Productivity and Security

Making a business more productive is on the agenda of every business owner or entrepreneur. Now more than ever, people are taking their work on the go and using digital technologies to make things happen faster and more efficiently. Technological innovations have allowed productivity to flourish in industries
email encryption
October 21, 2016

The Dangers of Unencrypted Email

Email encryption and security should be a main concern for any business owner. If it hasn’t been a priority in the past, it’s essential that you make it one starting now. Sending unencrypted emails presents the opportunity for hackers to steal confidential information from your business. The added