Tech

  • Think Twice Before You Hit Reply

    The CEO of one of our client companies sent an email to the CFO simply asking if the CFO was in the office and if so to please respond that they were. The problem was that the CEO never wrote the email. There was nothing “wrong” with the email except that it sounded a little […]

    Read more

  • Technology Trends – CryptoCurrency

    Many of you reading this are probably asking yourselves a similar question: what is Bitcoin? Bitcoin is what is known as cryptocurrency. The concept is a relatively simple one, but the practical implementation is anything but. Essentially, the idea behind cryptocurrency is that it provides an anonymous method of payment for digital transactions. Computers generate […]

    Read more

  • Is the Darkweb Really Dark?

    IT professionals have many loves: cable management, acronyms, mechanical keyboards and buzzwords.  Most of the time, your interaction with “IT stuff” comes in the form of buzzwords you hear. I don’t believe many of our readers would know that SCSI is pronounced “scuzzy,” but if I were you ask you about “the cloud” most of […]

    Read more

  • Are You and IT on the Same Page?

    Your relationship with your IT department or IT provider may be one of the most difficult business relationships you have. Often times you may feel you are speaking two entirely different languages. Effectively communicating is crucial to the success of your business and your bottom line. Those in the IT industry are generally pretty good […]

    Read more

  • NIST – Achieving Alignment in Cybersecurity

    Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but […]

    Read more

  • Phishing – There are Always More Phish in the Sea.

    “Oh, an email from Microsoft? That looks important.” Once you’ve opened the email the situation looks even more dire. “My account has been compromised?!” The email presents an easy solution: Microsoft, the ever helpful and friendly company has stopped the malicious actor in their tracks, and only needs you to login to verify your account […]

    Read more

  • Social Engineering: More than Just Phishing

    You are probably tired of reading about email security with constant chatter about phishing attacks. I get it, I’ve written 3 other articles on the topic. This month I’d like to go a step further and discuss other ways that criminals gain you or your client’s information through different types of social engineering. Social engineering […]

    Read more

  • Keeping Your Home Computers Mission Critical Ready

    Your laptops and desktop computers along with mobile devices make up your home IT department.  They are depended on to complete financial transactions, provide entertainment and control a variety of connected appliances.  Most importantly they may be the focal point for receiving teaching by way of on-line classes along with research and homework.  These systems […]

    Read more

  • NIST – Responding When the Stakes are High

    The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. As larger businesses invest heavily in cybersecurity, bad guys are turning their focus to small business as they are perceived as easier targets. The NIST CSF is […]

    Read more

  • NIST – Protecting What’s Most Important

    The National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. In our previous article NIST – Achieving Alignment in Cybersecurity we established that some form of cybersecurity posture is necessary to simply do business in today’s environment. […]

    Read more

  • NIST– Identifying What You Need to Protect

    In my previous article NIST – Achieving Alignment in Cybersecurity we discussed how the National Institute of Standards and Technology (NIST) created the Cybersecurity Framework (CSF) to give businesses foundational structure and common language to address their own individual security needs. We established that some form of cybersecurity posture is necessary to simply do business […]

    Read more

  • NIST – Achieving Alignment in Cybersecurity

    Technology has always been a dynamic market. Traditional focus has moved from a hardware/software to virtualization and the cloud but data has clearly been designated as the true prize and in the unpatrolled world of the Internet, it is up to you to secure it. You can have the fastest car in the lot but […]

    Read more

  • Successful On-Line Conferencing

    With more online meetings taking place in today’s environment, there are some best practices to follow to ensure their success.

    Start by making sure equipment is adequate to participate in the conference. Being able to hear, be heard and seen is key to a successful conference call. Check the quality of your microphone, speakers and camera on the device being used, whether a computer, tablet or phone by making a test call with a friend. If audio quality isn’t clear consider investing in a headset or earpiece. Going wireless will make mobility easier too.

    Before the meeting, conferences should be planned by the host.

    Read more

  • How Does Internet Naming Work?

    Have you ever wondered how it is that typing www.google.com into a web-browser brings you to (most) people’s favorite search engine? That function is accomplished by DNS, or Domain Name Services, and is what allows a Universal Resource Locator (URL) to translate something human-readable, like google.com, into something a computer can understand—in this instance, an […]

    Read more

  • Tech Tools to Assist a Remote Workforce

    In any business, the ability for staff members to communicate with one another and their supervisors is preeminently important. This is even truer now that the majority of the workforce is working remotely. In order to effectively manage their teams, there are a number of technologies that managers and business owners can take advantage of […]

    Read more

  • COVID-19 – Working Securely from Home

    A number of technologies can be used to facilitate remote work. Once of the oldest is the Remote Desktop Protocol, often referred to by its abbreviation, RDP. Remote desktop is a functionality built into the Windows operating system that allows a user to remotely connect to and control one workstation from another. Although the protocol […]

    Read more

  • The California Consumer Privacy Act – What’s in it for Me?

    The intentions of the CCPA are relatively straightforward. The law provides California residents the right to: know what personal data is being collected about them, know whether their personal data is sold or is disclosed and to whom, say no to the sale of personal data, access their personal data, request a business delete any […]

    Read more

  • How Does Internet Naming Work?

    If, for example, you needed to visit 172.217.4.174 every time you needed to search for something, but you needed to go to 157.240.11.35 to see what your brother-in-law’s kids have been up to, things eventually become very complicated. (As an aside, if you are so inclined, type either of those IP addresses into the address […]

    Read more

  • Microsoft Server 2008 R2 – End of Support Series

    To recap—End of Support means that Microsoft is going to stop “supporting” the operating systems listed above. What that essentially means is that Microsoft will no longer be providing updates (often referred to as patches) for those operating systems. On that surface that might seem like a good thing: “You mean my IT guy isn’t […]

    Read more

  • Throughout the life of an Operating System, the manufacturer will release updates, often referred to as patches. These may add new features, or address critical security vulnerabilities. While that manufacturer continues to patch up their previously released Operating System, they’re also working on releasing the next iteration. In Microsoft’s case, there have been two versions […]

    Read more

  • Centralize Your Security: Windows 10 Pro & Domains

    For more intents and purposes, Windows 10 effectively comes in two flavors: Home and Professional. Home is for what it sounds like it’s for—home use. Windows 10 Professional, then, is for business use. Although they are the same operating system, applying a Professional license key to a copy of Windows 10 unlocks a variety of […]

    Read more