Tech

  • NIST – Protecting What’s Most Important

    The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. In our previous article NIST – Achieving Alignment in Cybersecurity we established that some form of cybersecurity posture is necessary to simply do business in today’s environment. […]

    Read more

  • NIST– Identifying What You Need to Protect

    In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to simply do business […]

    Read more

  • NIST – Achieving Alignment in Cybersecurity

    Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but […]

    Read more

  • Successful On-Line Conferencing

    With more online meetings taking place in today’s environment, there are some best practices to follow to ensure their success.

    Start by making sure equipment is adequate to participate in the conference. Being able to hear, be heard and seen is key to a successful conference call. Check the quality of your microphone, speakers and camera on the device being used, whether a computer, tablet or phone by making a test call with a friend. If audio quality isn’t clear consider investing in a headset or earpiece. Going wireless will make mobility easier too.

    Before the meeting, conferences should be planned by the host.

    Read more

  • How Does Internet Naming Work?

    Have you ever wondered how it is that typing www.google.com into a web-browser brings you to (most) people’s favorite search engine? That function is accomplished by DNS, or Domain Name Services, and is what allows a Universal Resource Locator (URL) to translate something human-readable, like google.com, into something a computer can understand—in this instance, an […]

    Read more

  • Tech Tools to Assist a Remote Workforce

    In any business, the ability for staff members to communicate with one another and their supervisors is preeminently important. This is even truer now that the majority of the workforce is working remotely. In order to effectively manage their teams, there are a number of technologies that managers and business owners can take advantage of […]

    Read more

  • COVID-19 – Working Securely from Home

    A number of technologies can be used to facilitate remote work. Once of the oldest is the Remote Desktop Protocol, often referred to by its abbreviation, RDP. Remote desktop is a functionality built into the Windows operating system that allows a user to remotely connect to and control one workstation from another. Although the protocol […]

    Read more

  • The California Consumer Privacy Act – What’s in it for Me?

    The intentions of the CCPA are relatively straightforward. The law provides California residents the right to: know what personal data is being collected about them, know whether their personal data is sold or is disclosed and to whom, say no to the sale of personal data, access their personal data, request a business delete any […]

    Read more

  • How Does Internet Naming Work?

    If, for example, you needed to visit 172.217.4.174 every time you needed to search for something, but you needed to go to 157.240.11.35 to see what your brother-in-law’s kids have been up to, things eventually become very complicated. (As an aside, if you are so inclined, type either of those IP addresses into the address […]

    Read more

  • Microsoft Server 2008 R2 – End of Support Series

    To recap—End of Support means that Microsoft is going to stop “supporting” the operating systems listed above. What that essentially means is that Microsoft will no longer be providing updates (often referred to as patches) for those operating systems. On that surface that might seem like a good thing: “You mean my IT guy isn’t […]

    Read more

  • Throughout the life of an Operating System, the manufacturer will release updates, often referred to as patches. These may add new features, or address critical security vulnerabilities. While that manufacturer continues to patch up their previously released Operating System, they’re also working on releasing the next iteration. In Microsoft’s case, there have been two versions […]

    Read more

  • Centralize Your Security: Windows 10 Pro & Domains

    For more intents and purposes, Windows 10 effectively comes in two flavors: Home and Professional. Home is for what it sounds like it’s for—home use. Windows 10 Professional, then, is for business use. Although they are the same operating system, applying a Professional license key to a copy of Windows 10 unlocks a variety of […]

    Read more

  • Microsoft Windows 7 – End of Life Series

    Things aren’t quite so gloomy however, as long as you take steps to ensure that you’re not caught unaware of the change in Windows 7 support. Consider yourself on the way, as you’re about to complete Step 1: find out what “end of life” means and what to do about it! Throughout the life of […]

    Read more

  • Not All Email is Created Equal

    Perhaps you responded to a message on your phone yesterday, but it still shows as unread in your inbox on your laptop. Maybe your coworker sent you a calendar invite that you accepted on your computer, but it’s not showing at all when you double-check the meeting time. So much of modern business runs on […]

    Read more

  • Insider IT Threats – It’s not Just the Bad Guys Trying to Gain Access

    Insiders pose one of the biggest threats to any business IT environment—they have access to the infrastructure, understand its layout, and might even be the most motivated to inflict damage. This probably seems counterintuitive. Depending upon your place of employment, you’ve probably heard about hardware or software firewalls, multi-factor authentication, and the need for ever […]

    Read more

  • Is the Darkweb Really Dark?

    IT professionals have many loves: cable management, acronyms, mechanical keyboards—and buzzwords. In fact, much of the time, your interaction with “things IT” comes in the form of buzzwords intruding into the wider lexicon. I don’t believe many of our readers would know that SCSI is pronounced “scuzzy,” but if I were you ask you about […]

    Read more

  • Microsoft Server 2008 R2 – End of Support Series

    This month we are covering the same topic, but from the server side of things—End of Support for Windows Server 2008, 2008 R2, and SQL Server 2008. What does all that mean for you? Potentially—quite a lot! To recap—End of Support means that Microsoft is going to stop “supporting” the operating systems listed above. What […]

    Read more

  • Microsoft Windows 7 – End of Life Series

    Things aren’t quite so gloomy however, as long as you take steps to ensure that you’re not caught unaware of the change in Windows 7 support. Consider yourself on the way, as you’re about to complete Step 1: find out what “end of life” means and what to do about it! Throughout the life of […]

    Read more

  • Not All Email is Created Equal

    The beauty and curse of today’s bring-your-own-device environment is that you are constantly connected to your coworkers and clients. Having a single mail account spread across multiple devices poses a unique set of challenges. Perhaps you responded to a message on your phone yesterday, but it still shows as unread in your inbox on your […]

    Read more

  • Search Engines: 1 + 2 = 6

    Many of you reading this article remember a time before Google—when sites like Altavista, DogPile, and AskJeeves all competed to provide search results to content hungry users. Many others of you reading this article have no idea what any of those companies were—which shows the power and associated market share that Google now commands. With […]

    Read more

  • Technology Gifts to Buy for 2019

    Technology seems to be built into every common household device in one form or another. Gifts to help make a house “smarter” are a favorite. It starts at the entry way as the video doorbell allows one to view and respond to whoever is looking for their attention by connecting to a smart phone whether […]

    Read more

  • Social Engineering: More than Just Phishing

    Social engineering is the act of manipulating people by appealing to some angle of their human psyche. Phishing is the most talked about one, but other top tactics include: pretexting, baiting, quid pro quo and tailgating. Pretexting involves a scammer who has presented some sort of back story or pretense for speaking to you that sounds […]

    Read more