Is Your Data Secure On Your Portable Devices?

IT Consulting, Security

In the mid to late 2000s, the concept of BYOD (Bring Your Own Device) emerged onto the business scene. Instead of employers providing mobile phones for their employees, many workers chose to bring their own phones to the workplace, and use them for business. Fast-forward to 2020, and BYOD is as commonplace as free WIFI. However, do you know for … Read More

Safety and Security While Using Zoom

Security, Work From Home Solutions

If You’re Required to use Zoom as a Meeting Host Zoom is the most widely known platform, and when participating we don’t often get to choose which system we’ll be meeting on. Sometimes our employers require a certain platform, or sometimes our audience expects it. If you don’t have a choice in which platform to use, there are still some … Read More

Does Your Network Have A Protective “Face Mask” to the World?

Covid 19, IT Consulting, Security, Work From Home Solutions

During Times Like Now, It’s Important We Don’t Let Our Guard Down The COVID-19 Pandemic has caused a surge in people working from home. This transition has been made much easier through the use of readily available tools like Zoom, and various VPNs (Virtual Private Networks). However, many businesses were not prepared to have their workforce suddenly become remote workers. … Read More

Urgent Windows 10 Update

IT Consulting, Security

Microsoft has released a critical patch for Windows 10. The patch closes a vulnerability discovered by the NSA. In a press release published by the NSA, the agency explains “the certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. Exploitation of the vulnerability allows attackers to abuse validation of trust … Read More

What Is Two-factor Authentication

Education, IT Consulting, Security

Two-factor authentication is the latest technology for securing anything you might log in to. You still have your traditional username and password, but there is an added layer “the second factor.” Typically, logging into an account with two factor goes like this: Add user name and password. A dialog box displays, asking you to enter the authentication code. You have … Read More

Backups – A Business Necessity

Education, Industry, IT Consulting

It may seem like a no-brainer to some, but there are some businesses that do not have a robust backup system in place.  Backups are a necessity in the business world, regardless of how big, or how small, a business may be.  If you are “backing up” your data, you may not have enough redundancy in place to recover lost … Read More