Month: September 2014

Do you know how many users are tapped into your wireless network right now? How about when you’re not around? The fact is that many small business owners have no idea who is accessing what on their wireless network, and they’d be shocked to find out just how many people are leeching their bandwidth away.

Could Potentially Be More Dangerous Than the Infamous Heartbleed! A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open/SSL bug that

A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux. So how does the vulnerability work? An attacker is able to exploit the vulnerability, then

In today’s increasingly mobile business environment, many employees use consumer grade file sync services to access and share files wherever they’re located; however, the adoption of consumer grade file sync services presents a huge security risk. Unfortunately, a mobile workforce inspired by the BYOD trend makes it difficult to protect sensitive data. While there’s significant

Yesterday, Apple did a complete 180 on their recent update to the iPhone and iPad Operating System. Just after a week of launching their iOS 8 update as part of their iPhone 6 release, Apple pulls the plug on 8.0.1 and promises 8.0.2 in the next few days. What do you do in the mean

We all have that one person on our friends-list. You know who I’m talking about – that person who posts everything including the kitchen sink to their Facebook page. Pictures of what they have for dinner and check-ins at the corner store. But they ARE your friend, and you don’t want to hurt their feelings.

Watch out: There’s a hacker eyeing up your business. To him, it doesn’t matter that you’re not a big fish like Home Depot or Adobe – in fact, that’s what makes you such an appealing target. He hopes that means you don’t have the kind of security the big corporations do. He’s poking around your

Don’t Fall Victim to the Latest Malicious Attack Spreading on the Internet – Keep Your Computers Up-to-Date or Face Costly Data Theft & Irreparable Reputational Damage! You’ve heard about the importance of keeping your computer updated time and time again, however, a lot of business owners and employees continue to neglect the latest patches, fixes,

Passwords – the necessary evil in the information technology world. If you have one that is simple, it will be easy to crack and just doesn’t seem safe. If you have one that’s safe and complex, you’ll never remember it. It’s a frustrating conundrum for everyone. As your team of trusted IT professionals in {city},

Technology systems don’t last forever. No matter how good a computer or a server is, it will need to be fixed or replaced at some point down the road. Unfortunately that’s lead to some business owners treating their information technology like disposable razors: whoops, this one’s dull – better go buy a new one. If