What is Malware and Why Should I Care?

Malicious Software or Malware is a serious concern to IT Security experts and business owners alike.  Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets.  It is no surprise that the Computing Technology Industry Association (CompTIA) tenth annual IT Security Information Trends report placed Malware at the top of the […]

Are You Ready for Mobility?

Mobility in the workforce is increasing productivity and driving savings for small to medium sized companies. Recent research from the Computer Technology Industry Association (CompTIA) uncovers 73% of small businesses surveyed cite they have a mobile device strategy driven by moderate to heavy focus for Mobility to make employees in the field more productive. Moreover, […]

Happy Data Privacy Day!

Data Privacy Day may not be a holiday for your IT Support Professional, however, it is an international holiday dedicated to education about Data Privacy. On this day many private, government and academic Data Privacy and IT Security Professionals get together and discuss key issues about Data Privacy. What is Privacy Data and What Does […]

2013 IT Trends

2013 IT Trends There are a number of driving factors that will influence 2013 IT trends. These trends include Mobility, Cloud Computing, Disaster Recovery and IT Security. These 2013 IT trends will influence IT budgets and plans, while enabling companies to take advantage of mobile computing, enterprise infrastructure, software as a service (SaaS), social networks […]

Beyond Bring Your Own Device

Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work from home and spend time in the field.  The BYOD policy allows employees to use personal smart phones and tablets […]

Internet Browser Security Tips

Internet Browser Security Tips Left unprotected, Internet browsers including: Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are increasingly vulnerable to software attacks and may be a place where malicious software, aka Malware can infiltrate your PC and ultimately breach your network security. There are many things you can do to proactively protect […]

Maintaining Network Security

Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPAA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s critical data. Without proper network security, your network may be vulnerable to computer virus and malware attacks and unauthorized access […]

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical business applications. This policy can make your employees more productive. BYOD may save you the expense […]

Data protection and security update LinkedIn

Data Protection and Password Security Update: LinkedIn On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog https://blog.linkedin.com/2012/06/07/taking-steps-to-protect-our-members/ ”LinkedIn learned that approximately 6.5 million hashed LinkedIn passwords were posted on a hacker site. Most of the passwords on the list appear to remain hashed and hard to […]