By now most of us know a significant amount of information is being gathered about us every time we browse the web.
You may have seen articles about the Internet of Things or references to IoT, but do you really know what this means?
Do you hate waiting in line as much as we do? Continue reading “Skip the lines, and save yourself some stress….”
If not, today is the day to get started. The steps we recommend are a bit time consuming, but necessary. Also, there are many things to consider and likely numerous people in your immediate family for whom these steps will need to be taken.
Continue reading “Have You Dealt With the Equifax Breach?”
It has been a number of weeks since a major flaw was reported in what is called the Wi-Fi Protected Access (WPA) protocol and we have been monitoring the tech blogs to see how this would shake out. Let’s address the protocol and the roll it likely plays in your life.
Defending your systems against malicious threats is best handled by layered protection. We are now offering another layer with a best-in-class Web Protection service that will keep your users safe and productive. It complements traditional antivirus engines and firewalls by letting you define your own content-filtering policies, website blacklists, time-based and content-based browsing policies, and much more.
This service is immediately available! Contact us today to discuss pricing and a roll-out strategy for your team.
Unfortunately, malicious software seems to be hiding in every corner of the Internet these days and for ICS technicians, it feels as though we are playing an unending game of Whac-A-Mole. It is part of our job however and we will keep battling on your behalf!
I think we have all witnessed smartphone addiction in our lives. It could be at the hands of friends, family, or even yourself.
Continue reading “Smartphone Addiction”
It has been 2 weeks since the largest ransomeware attack in Internet history. Although it may have been the largest, it certainly wasn’t the first and definitely won’t be the last. Continue reading “Wannacry Ransomware Another Reminder to Stay Vigilant”
Two-Factor authentication (2FA) is available on most major services; think Gmail, Facebook, Twitter, etc. But what is it?
Continue reading “Using Two-Factor Authentication (2FA)? You Should Be”