Great password advice from Maastricht University in Maastricht, Netherlands.
According to Microsoft Store’s 2017 Small Business Insights Survey, 43% of all cyber attacks will target small business. Over 50% of small businesses say they are not concerned about a cyber attack. Even more concerning, over 25% of small businesses say they are doing nothing about data security. Consider my mind blown….. With all of the media information about data security and cyber attacks, I believe More »
Why Use Managed Services? Concentrate on growing your business The major benefit of managed services is that you, as a business owner, do not have to worry about your daily IT operations. You have enough on your plate growing your business, talking to prospects, leading your employees; the last thing you want to concern yourself with is the IT systems. Imagine asking yourself on the More »
Here is a news story about a large company and employee data theft. Over 40% of company data breaches are from employees – click here for the story It is now critical than ever to protect your business data. When you know an employee is leaving, a full activity review should be made before they walk out the door. We can help!! Contact us 1 800 More »
I was talking to a potential client who was having issues with their VOIP phone system. There seemed to be confusion on whether the data for the phone system was backed up. The client wanted to expand their network but needed confirmation from their IT people who were having trouble confirming the information. There should be no “confusion” or question. Testing your data backups More »
One of the services that we provide our clients under a Managed Services Plan (MSP) is remote monitoring of components in their system. The reason our clients choose to be on a MSP is to keep the computer system running efficiently at all times. This is achieved by defined periods of maintenance and by detecting problems before they create downtime. One way we keep a More »
No this is not an ad for a new video game but it would be a great movie title! I want to highlight our process of deleting data permanently off storage devices. Why should you care? Data on storage devices can be recovered even if deleted. The normal delete process does not actually remove any data, just the pointer to the data*, as a result, More »
Recently, we have seen a number of text messages come across our mobile phones that, if opened, can create problems for you. Example #1 “Hi, it’s Fido: You’ve been refunded 10.15$ due to an overcharge on your last bill. Click here to claim your funds: interafund.info/interac/” Notice that the $ sign is behind the dollar amount instead of in front. Example #2: “A purchase has More »
Widespread microprocessor flaws called Meltdown and Spectre have been recently identified. These vulnerabilities are related to the architecture of the processor ship installed in your computer. These vulnerabilities allow hackers to potentially “observe” passwords and other sensitive personal data on computers It was discovered by Google several months ago. This affects owners of both Windows PCs and Apple Mac computers built with Intel, ARM and More »