(800) 991-6241

Network Security Layers For The Win!

There are a lot of different components to consider when compiling a network for your business – with safety, hopefully, being the most important aspect of that project. Unfortunately, ensuring a network’s safety isn’t comprised of simply checking-off items on a list...

The Google Hack Fake-out: A Cautionary Tale

By now, you’ve probably heard about the notorious “Google Hack” that apparently, wasn’t. Early last month, it was announced that an anonymous Russian hacker obtained the account credentials for an estimated 272 million online accounts from hosts ranging from Google to...

Wait Before You Uninstall QuickTime

On April 14th, the Department of Homeland Security’s Computer Emergency Readiness Team (CERT) issued an advisory for all Windows users to uninstall QuickTime from their computers due to Apple’s announcement that they will no longer be providing security updates for...

Microsoft OS Licensing – Types and Tips

The enterprise end of Microsoft OS licensing can be a land of unknown jargon – daunting, and (seemingly) incomprehensible. As Microsoft is a standard OS for most businesses to have these days, it’s important to tackle these unknown aspects of  this...

Changing the Rules on Passwords

Cyber security is the hot topic these days with hackers having their way with unsuspecting victims, and proper password management is a great way to first handedly combat intruders before they have a chance to breech your system completely. When it comes to password...

Free Antivirus: Friend, or Foe?

We’ve all probably done it at some point in time, and it’s usually something we regret shortly after the download completes. With all the risks we are prone to while poking around the reaches of web, the lure of free antivirus software is strong and rather convincing....