Social Engineering

As information security measures become more complex and powerful, many criminals and hackers are taking advantage of other kinds of vulnerabilities in what are known as “social engineering” attacks. If you’ve heard about the rising epidemic of tax fraud, then you’ve...

Cloud Computing Basics

A lot has been made recently of cloud computing- having the computational “heavy lifting” done by servers across the internet, rather than by the machine the user is seated at. There are some tremendous advantages that can be had in the cloud, but it can be expensive...

“Legacy” Systems

Businesses don’t like changing their processes- it’s expensive, time consuming, and can put a (hopefully temporary) strain on daily operations. But there are a lot of risks associated with old or outdated technology, and being proactive about updating and replacing...

Windows 10 – Upgrading and Costs

We’ve been getting some questions about the specifics in upgrading to Windows 10, especially regarding costs and compatibility. So here is a rundown of what to expect: Windows Vista and any previous versions are not being offered a free upgrade. There are concerns-...

Encryption

Encryption is becoming more and more necessary as more of our devices become connected to the internet- whenever sensitive information touches public data lines, it’s vulnerable- to hackers, to data collectors, even to occasional data line misfires. The best way to...

BYOD

There is an ongoing push lately for BYOD options- “Bring Your Own Device”, where an employee can set up their personal smart phone or tablet computer to work on job-related information. These options can be a great savings for any company in costs, both for hardware...
Skip to content