News

How Exposed Are You Online?

Is privacy in America dead? With all the camera phones, online tracking software and social media sites, you can pretty much bet on it. But that doesn’t mean you can’t protect yourself.

For starters, go to Google Maps and search your name to see if they have a picture of your home mapped out.

The 5 Most Dangerous Pieces Of Information To Give In An E-mail

In the book Spam Nation, investigative journalist and cybersecurity expert Brian Krebs revealed the single most effective (and relied upon) way cybercrime rings gain access to your bank account, credit cards and identity. Ready for it? E-mail.

Whether it’s opening an attachment infected by a virus, or a phishing scam where you unknowingly give up your login to a critical web site,  e-mail still remains the most popular and reliable way digital thieves can rob you blind, steal your identity and wreak havoc on your network.

An Urgent Security Warning For Businesses Running Microsoft Server 2003

On July 14, 2015, Microsoft is officially retiring Windows Server 2003 and will no longer be offering support, updates or security patches. That means any server with this operating system installed will be completely exposed to serious hacker attacks aimed at taking control of your network, stealing data, crashing your system and inflicting a host of other business-crippling problems you do NOT want to have to deal with.

4 Ways To Get More From Your Team

1.  Your Team Needs To Learn Together

Rarely do teams learn together. Too often, increases in skill are confined to individuals. Sometimes that can become a barrier to teamwork: because there are dramatically different knowledge and skill levels, some team members aren’t able to keep up.

New Gadget of the Month: InfiniteUSB

As laptops grow thinner, USB ports become scarcer. This means that if you need to connect to many printers, phones, or a mouse, you need to carry around a multiport hub to plug in various devices. But Jiange has created a USB plug that is based on a daisy chain, allowing you to plug multiple devices into one USB port.

How To Make Yourself ‘Invisible’ To Hackers

There’s an old joke about two men hiking in the woods when they come across a big, grumpy black bear. Scared silly, one of the guys starts to run but notices his buddy stopped, bent-over, changing his shoes. He shouts to him, “Dude! What are you doing?!?! Why aren’t you running?” to which his friend replies, “I’m changing my shoes because I don’t need to outrun the bear – I only need to outrun YOU.”

This is a perfect analogy for what’s going on in small businesses: the “slow,” easy targets are getting nailed by fast-growing cybercrime rings that are getting more sophisticated and aggressive in attacking small businesses.

3 “Gotchas” Most IT Pros Won’t Tell You

3 “Gotchas” Most IT Pros Won’t Tell You When Selling You Their Cloud Solution

Are you using any cloud applications to store data? Then listen up! There are a few “gotchas” you need to know about 3rd-party cloud apps that most sales reps will NEVER tell you.

Spring Clean Your Computer For Maximum Performance

With Spring in the air, now is a good time to do an annual clean up of the computers, servers and electronic equipment in your office, both inside and out.

Failure to thoroughly clean your computer at least once or twice a year will result in decreased performance and possibly even system failures.