The Risk Of Showing Text Message Previews On Your Lock Screen

Eric TateBlog

The Risk Of Showing Text Message Previews On Your Lock Screen

  Lock screen notifications on your cell phone are a big convenience. Being able to access incoming information at a glance is very helpful and can help increase your efficiency. This convenience though, can come at a price. In most cases, your cell phone’s lock screen is showing all details associated with the notification. When associated with potentially sensitive information, … Read More

Why Your Deleted Data Might Not Actually Be Deleted

Eric TateBlog

Why Your Deleted Data Might Not Actually Be Deleted

There are many reasons why you may choose or need to delete a file from your computer’s hard drive. Whether the file is no longer needed or it contains sensitive data, deleting a file is a standard practice performed by most computer users. When you delete files (and empty your recycling bin when applicable), they’re no longer accessible to you … Read More

Top Tech Books to Read this Summer

Eric MorseBlog

Top Tech Books to Read this Summer

It’s finally that time of year again where the warm weather is upon us. The birds are chirping. The days are getting longer. It’s the perfect time for some outdoor reading in a peaceful backyard! Are you looking to find something new to dive into that’s related to the technology world we live in? Well lucky for you, we have … Read More

Why You Should NOT Modify Your HOSTS File

Eric TateBlog

Why You Should Not Modify Your HOSTS File

  Network issues can be a tricky thing to solve. What may seem like the simplest of problems could actually be rather complex behind the scenes. Since its in our nature to take matters into our own hands, those curious to try and solve the issue themselves may turn to Google to try to locate a solution. But it’s important … Read More

The End is Coming for Windows 7

Eric TateBlog

The End is Coming for Windows 7

  The end is coming for one of the most widely used pieces of technology in existence today! In less than a year, Microsoft will be officially discontinuing support for the operating system Windows 7 after nearly eleven years. If you’ve used any computer during that time, there is a very high probability that it was running Windows 7, considering … Read More

How To Protect Your Domain Names Integrity

Eric TateBlog

The principle of least privilege helps us keep our belongings, data, and ourselves as safe and secure as possible.  In the following post, we'll be discussing How To Protect Your Domain Names Integrity

In our everyday lives, we tend to make decisions based on the principle of least privilege. Our decisions related to standard occurrences are instinctively designed to provide ourselves, or those involved, with minimal access to the resources needed to get the job done. Ordering a pizza to your home? The delivery driver will only come as far as your front … Read More

The Truth About Smart Speakers

Eric TateBlog

The Truth About Smart Speakers

As we inch closer to the holiday season and great shopping deals arise, many of you may be considering adding smart functionality to you or a loved one’s home by purchasing a smart speaker such Amazon Echo or Google Home (for a comparison, check out our post How Smart is Your Home?). But in an age of always-connected devices, there … Read More

Why Fake News Should Be Taken Seriously

Brandy SandinBlog

Why Fake News Should Be Taken Seriously

Most recently our Facebook feeds were filled with chain letters claiming that if you received a friend request from someone that it was an imposture that had created a fraudulent account and now you too may be affected and so on and so on and so on… Every other post on my feed was another chain letter – same as … Read More

How To Avoid Phishing Scams

Michael GadaletaBlog

How to Avoid Phishing Scams

How to avoid Phishing scams Remember when all those advertisements used to come in the mail to your house?  We used to call it “junk mail” and immediately threw it away, never looking twice at it.  Now instead of being delivered to your house and placed in your mailbox, it is now being delivered electronically to your computer or mobile … Read More

The Risks Of Having Admin Access To Your Computer

Nicholas WestgateBlog

The Risks Of Having Admin Access To Your Computer

Often overlooked, but a highly effective and simple method to mitigate data security risk, is limiting end-user permissions.  Especially for this post, we’re discussing limiting or removing altogether, local administrative rights. When it comes to assigning permissions within an organization, a best practice is to assign the permissions that are only necessary for end users to do their jobs. In … Read More