Two Factor Authentication -Why You Need It

IT Consulting, Security

The following is a true story, and one to pay very close attention to. A person tried logging into their Facebook account, but was unable to login.  They had the right password, but were told it was wrong.  Almost in an instant, online banking showed purchases online with Amazon.  At the same time this was happening, their Venmo and Paypal … Read More

USB Drive Security

IT Consulting, Security

Believe it or not, USB drives, or “thumb drives”, as they are called, are still a popular tool for storing data.  They are compact, lightweight, and can be easily transported.  Also, the amount of storage space has increased dramatically over the years.  However, there are some important security items for you to consider if you are using them in your … Read More

Backups – Healthy or Unhealthy?

Backups, IT Consulting, Security

An article that we published about a year ago talks about how backups are important, and are a necessity in the business world. While backups are great to have, they are only good if the data on them is sound.  Here are some things to consider regarding your backups. Backup Types Knowing what type of backups you have goes a long … Read More

Security Cameras – Do You Need Them?

IT Consulting, Security

It takes a significant amount of time to build up your business into what you want it to be.  You may have an office building, perhaps an outside yard that houses equipment and/or vehicles.  You also have your home to consider; your safe haven from the world containing all your possessions.  Have you considered getting a security camera system to … Read More

How to handle IT when an employee leaves

IT Consulting, Security

In the business world, employees come, and employees go.  While sometimes it’s amicable, sometimes, someone’s departure is anything but that.  However, in regards to your company’s data, there needs to be a process in place on making sure your data is secure when someone leaves the company.  This article will address that. Level of access The first, and most important … Read More

It’s 2020 – Time For A Windows 2004 Update

Microsoft, Security

Wait, what?  That is right, the latest feature update from Microsoft is 2004, being released in the year 2020.  Do not be confused by the version number, as it means that it was available for release in April (04) of 2020 (20).  Enough of that explanation, let’s get started as to what this is all about, and some considerations you … Read More

Is Your Data Secure On Your Portable Devices?

IT Consulting, Security

In the mid to late 2000s, the concept of BYOD (Bring Your Own Device) emerged onto the business scene. Instead of employers providing mobile phones for their employees, many workers chose to bring their own phones to the workplace, and use them for business. Fast-forward to 2020, and BYOD is as commonplace as free WIFI. However, do you know for … Read More

Safety and Security While Using Zoom

Security, Work From Home Solutions

If You’re Required to use Zoom as a Meeting Host Zoom is the most widely known platform, and when participating we don’t often get to choose which system we’ll be meeting on. Sometimes our employers require a certain platform, or sometimes our audience expects it. If you don’t have a choice in which platform to use, there are still some … Read More

Does Your Network Have A Protective “Face Mask” to the World?

Covid 19, IT Consulting, Security, Work From Home Solutions

During Times Like Now, It’s Important We Don’t Let Our Guard Down The COVID-19 Pandemic has caused a surge in people working from home. This transition has been made much easier through the use of readily available tools like Zoom, and various VPNs (Virtual Private Networks). However, many businesses were not prepared to have their workforce suddenly become remote workers. … Read More

Urgent Windows 10 Update

IT Consulting, Security

Microsoft has released a critical patch for Windows 10. The patch closes a vulnerability discovered by the NSA. In a press release published by the NSA, the agency explains “the certificate validation vulnerability allows an attacker to undermine how Windows verifies cryptographic trust and can enable remote code execution. Exploitation of the vulnerability allows attackers to abuse validation of trust … Read More