The Truth About Smart Speakers

Eric TateBlog

The Truth About Smart Speakers

As we inch closer to the holiday season and great shopping deals arise, many of you may be considering adding smart functionality to you or a loved one’s home by purchasing a smart speaker such Amazon Echo or Google Home (for a comparison, check out our post How Smart is Your Home?). But in an age of always-connected devices, there … Read More

Why Fake News Should Be Taken Seriously

Brandy SandinBlog

Why Fake News Should Be Taken Seriously

Most recently our Facebook feeds were filled with chain letters claiming that if you received a friend request from someone that it was an imposture that had created a fraudulent account and now you too may be affected and so on and so on and so on… Every other post on my feed was another chain letter – same as … Read More

How To Avoid Phishing Scams

Michael GadaletaBlog

How to Avoid Phishing Scams

How to avoid Phishing scams Remember when all those advertisements used to come in the mail to your house?  We used to call it “junk mail” and immediately threw it away, never looking twice at it.  Now instead of being delivered to your house and placed in your mailbox, it is now being delivered electronically to your computer or mobile … Read More

The Risks Of Having Admin Access To Your Computer

Nicholas WestgateBlog

The Risks Of Having Admin Access To Your Computer

Often overlooked, but a highly effective and simple method to mitigate data security risk, is limiting end-user permissions.  Especially for this post, we’re discussing limiting or removing altogether, local administrative rights. When it comes to assigning permissions within an organization, a best practice is to assign the permissions that are only necessary for end users to do their jobs. In … Read More

Why Your Business Should Consider a Hosted Desktop Solution

Nicholas WestgateBlog

Does it make sense to keep replacing PCs as they age, or should you migrate to a Hosted Desktop solution? What is a Hosted Desktop anyway? In this week’s blog post we’ll attempt to answer those questions and help you come to a conclusion as to why your business should consider a hosted desktop solution. First, let’s explain what a … Read More

Cyberattacks, Phishing, and Ransomware

Nicholas WestgateBlog

Cyberattacks, Phishing, and Ransomware

Cyberattacks. Phishing. Ransomware. These words sound like something out of a science-fiction movie, but as we face the ever-growing challenges of Cyberattacks, “Phishing and Ransomware” are becoming much more commonplace. According to the Webroot Quarterly Threat Trends September 2017 report,  Phishing is the number one form of Cyberattack, and in 2016, 93% of Phishing attacks led to Ransomware. What does this mean? It … Read More

New Year’s Resolutions for Small Business Tech

Nicholas WestgateBlog

10 New Year’s Resolutions for Small Business Tech

Every year we make resolutions to improve ourselves: lose weight, travel the world and become more technically savvy!  Okay maybe the last one didn’t make your list but it should!   Here are some New Year’s resolutions to improve your use of technology, protect your data and help your business be more productive in 2018 giving you more time to look … Read More

Secured Connection Vulnerabilities on Apple Devices

Paul MorganBlog

apple security flaw

Are you like most of us and own and use an Apple device (phone, laptop, or tablet)? Unfortunately, an extremely concerning security flaw has been reported that’s so bad that developers won’t even discuss details (to prevent giving hackers insight into how to exploit the hack). The security flaw affects SSL/TLS connections for the devices, which normally prevent eavesdropping on … Read More

Cryptolocker: A New Era of Ransomware

Paul MorganBlog

ransomware

A particularly nasty new “ransomware” virus has started to appear on the radar of security companies at the end of mid-September. Cryptolocker, as it was later coined, amazed security experts with the innovative way it extorts money from the targets that it infects using unbreakable, industry standard file encryption. What does it do? When infected, Cryptolocker causes your machine to … Read More

Computer Viruses – Who, What, How and Why

Graham CaparuloBlog

virus-detected

Some of the most common questions that we hear from customers revolve around computer viruses: “How did I get this virus?”. “What exactly is a virus?”. “Who writes them and why?”. So, in the post, I’ll focus on the How, What, Who and Why of viruses. As a follow up post, I’ll talk about what you can do to protect … Read More