Why You Should NOT Modify Your HOSTS File

Eric TateBlog

Why You Should Not Modify Your HOSTS File

  Network issues can be a tricky thing to solve. What may seem like the simplest of problems could actually be rather complex behind the scenes. Since its in our nature to take matters into our own hands, those curious to try and solve the issue themselves may turn to Google to try to locate a solution. But it’s important … Read More

The End is Coming for Windows 7

Eric TateBlog

The End is Coming for Windows 7

  The end is coming for one of the most widely used pieces of technology in existence today! In less than a year, Microsoft will be officially discontinuing support for the operating system Windows 7 after nearly eleven years. If you’ve used any computer during that time, there is a very high probability that it was running Windows 7, considering … Read More

How To Protect Your Domain Names Integrity

Eric TateBlog

The principle of least privilege helps us keep our belongings, data, and ourselves as safe and secure as possible.  In the following post, we'll be discussing How To Protect Your Domain Names Integrity

In our everyday lives, we tend to make decisions based on the principle of least privilege. Our decisions related to standard occurrences are instinctively designed to provide ourselves, or those involved, with minimal access to the resources needed to get the job done. Ordering a pizza to your home? The delivery driver will only come as far as your front … Read More

The Truth About Smart Speakers

Eric TateBlog

The Truth About Smart Speakers

As we inch closer to the holiday season and great shopping deals arise, many of you may be considering adding smart functionality to you or a loved one’s home by purchasing a smart speaker such Amazon Echo or Google Home (for a comparison, check out our post How Smart is Your Home?). But in an age of always-connected devices, there … Read More

Why Fake News Should Be Taken Seriously

Brandy SandinBlog

Why Fake News Should Be Taken Seriously

Most recently our Facebook feeds were filled with chain letters claiming that if you received a friend request from someone that it was an imposture that had created a fraudulent account and now you too may be affected and so on and so on and so on… Every other post on my feed was another chain letter – same as … Read More

How To Avoid Phishing Scams

Michael GadaletaBlog

How to Avoid Phishing Scams

How to avoid Phishing scams Remember when all those advertisements used to come in the mail to your house?  We used to call it “junk mail” and immediately threw it away, never looking twice at it.  Now instead of being delivered to your house and placed in your mailbox, it is now being delivered electronically to your computer or mobile … Read More

The Risks Of Having Admin Access To Your Computer

Nicholas WestgateBlog

The Risks Of Having Admin Access To Your Computer

Often overlooked, but a highly effective and simple method to mitigate data security risk, is limiting end-user permissions.  Especially for this post, we’re discussing limiting or removing altogether, local administrative rights. When it comes to assigning permissions within an organization, a best practice is to assign the permissions that are only necessary for end users to do their jobs. In … Read More

Why Your Business Should Consider a Hosted Desktop Solution

Nicholas WestgateBlog

Does it make sense to keep replacing PCs as they age, or should you migrate to a Hosted Desktop solution? What is a Hosted Desktop anyway? In this week’s blog post we’ll attempt to answer those questions and help you come to a conclusion as to why your business should consider a hosted desktop solution. First, let’s explain what a … Read More

Cyberattacks, Phishing, and Ransomware

Nicholas WestgateBlog

Cyberattacks, Phishing, and Ransomware

Cyberattacks. Phishing. Ransomware. These words sound like something out of a science-fiction movie, but as we face the ever-growing challenges of Cyberattacks, “Phishing and Ransomware” are becoming much more commonplace. According to the Webroot Quarterly Threat Trends September 2017 report,  Phishing is the number one form of Cyberattack, and in 2016, 93% of Phishing attacks led to Ransomware. What does this mean? It … Read More

New Year’s Resolutions for Small Business Tech

Nicholas WestgateBlog

10 New Year’s Resolutions for Small Business Tech

Every year we make resolutions to improve ourselves: lose weight, travel the world and become more technically savvy!  Okay maybe the last one didn’t make your list but it should!   Here are some New Year’s resolutions to improve your use of technology, protect your data and help your business be more productive in 2018 giving you more time to look … Read More