IT’s Time to Grow Up

IT’s Time to Grow Up

The owners of growing businesses face a very real challenge where their technology infrastructure is concerned.  As your business grows, the IT solutions that once worked so well for you may no longer make sense.  Maybe you put a fantastic inventory management system in place that did everything you needed it to do, but that was when YOU had to take care of the inventory.

Wikileaks details router vulnerabilities

Wikileaks details router vulnerabilities

When we write about how antivirus software isn’t enough to keep you safe from malware, it’s not just scare tactics. There are so many ways hackers can break into your system that antivirus solutions will never catch. For a real-world example, look no further than the router exploit kit recently leaked from the CIA.
The Wikileaks CIA documents
For several months, the notorious website famous for leaking government data has been rolling out information it obtained from the Central Intelligence Agency.

What’s Your Firewall Against Extinction?

What’s Your Firewall Against Extinction?

Like it or not, the world’s biodiversity is diminishing.  Fortunately, zoos are playing a greater role in preventing the extinction of species in nature—in effect, they have become firewalls against extinction.  Zoos provide naturalistic habitats for animals that give the illusion of open access, but both the animals and the visitors are protected.

WannaCry: A historic cyberattack

WannaCry: A historic cyberattack

No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.

Why You Need Email Encryption

Why You Need Email Encryption

Would you be upset if someone unintended read your mail?  What if the letter contained sensitive information?  Now consider email.  If you’re like many people these days, you send and receive literally hundreds of emails a week.

While we recognize that not all email is sensitive, there are times where you want to ensure the content of a message is kept confidential.