“No Fluff” Computer Services


Posted on December 11, 2018


.....READ MORE

3 Simple Steps to Protect Your Business Data


Posted on December 11, 2018


Conduct an audit of your data types. What kind of information would a criminal want? Creating security layers around sensitive data, such as—customer and employee information, intellectual property, and bank records will ensure that your business stays safe. Employees are the front line of de.....READ MORE

Time to Update MS Internet Explorer


Posted on December 11, 2018


Microsoft Support Database "For customers running on an older version of Internet Explorer, such as Internet Explorer 8 on Windows 7 Service Pack 1 (SP1), Microsoft recommends customers plan to migrate to one of the supported operating systems and browser combinations by January 12, 2016."--Microsof.....READ MORE

Email Encryption


Posted on December 11, 2018


Researchers at Google recently announced they are strengthening their email security. If you use Gmail, you will soon notice a warning when you receive an email from an unencrypted connection.Here's the announcement from Google that includes their latest research on email security based on a study t.....READ MORE

What are the different types of network security incidents?


Posted on December 11, 2018


 Media:An attack executed from removable media (e.g., flash drive, CD) or a peripheral device.Email:An attack executed via an email message or attachment (e.g. malware infection).Attrition:An attack that employs brute force methods to compromise, degrade, or destroy systems, networks, or services.I.....READ MORE

Cisco Security Patches


Posted on December 11, 2018


Most of us have become used to continually updating and patching 'bugs' in our computer systems. However, one leading IT vendor doesn't typically release many 'bug' updates-Cisco. So it's worth taking notice that Cisco has recently released their semi-annual updates that every system administrator s.....READ MORE

Recent Posts

.....READ MORE

What Is Cyber Insurance, and Should We Buy It?      For most businesses, covering liability wit.....READ MORE

Conduct an audit of your data types. What kind of information would a criminal want? Creating securi.....READ MORE