I was talking to a potential client who was having issues with their VOIP phone system. There seemed to be confusion on whether the data for the phone system was backed up. The client wanted to expand their network but needed confirmation from their IT people who were having trouble confirming the information. There should be no “confusion” or question. Testing your data backups More »
One of the services that we provide our clients under a Managed Services Plan (MSP) is remote monitoring of components in their system. The reason our clients choose to be on a MSP is to keep the computer system running efficiently at all times. This is achieved by defined periods of maintenance and by detecting problems before they create downtime. One way we keep a More »
No this is not an ad for a new video game but it would be a great movie title! I want to highlight our process of deleting data permanently off storage devices. Why should you care? Data on storage devices can be recovered even if deleted. The normal delete process does not actually remove any data, just the pointer to the data*, as a result, More »
Recently, we have seen a number of text messages come across our mobile phones that, if opened, can create problems for you. Example #1 “Hi, it’s Fido: You’ve been refunded 10.15$ due to an overcharge on your last bill. Click here to claim your funds: interafund.info/interac/” Notice that the $ sign is behind the dollar amount instead of in front. Example #2: “A purchase has More »
Widespread microprocessor flaws called Meltdown and Spectre have been recently identified. These vulnerabilities are related to the architecture of the processor ship installed in your computer. These vulnerabilities allow hackers to potentially “observe” passwords and other sensitive personal data on computers It was discovered by Google several months ago. This affects owners of both Windows PCs and Apple Mac computers built with Intel, ARM and More »