Old technology, new scam
Con artists identifying themselves as Microsoft employees are exploiting the less computer savvy public. Don’t become a victim!
Stay up-to-date on the latest IT Support, Cybersecurity and business technology news and trends.
Con artists identifying themselves as Microsoft employees are exploiting the less computer savvy public. Don’t become a victim!
With the pending release of the iPhone 4s/5 which has set the technology world into a frenzy I figured a smartphone posting was appropriate. As I look at my life (or at least my professional life) there is nothing and I mean nothing that has been at my side as much as a smartphone.
The fundamentals of network security remain the same. Firewalls, antivirus, backups, policies and procedures all play an important role in securing your digital assets.
For all of the Mac users out there that thought they were immune to viruses and malware it has been a really tough month.
For some organizations moving resources into the ‘cloud’ is a way to improve scalability, mobility, availability without large capital investments in equipment and software. Although this sounds like a great scenario, is it possible you are paining a nice big red target on your back?
Over the past week I have been dealing with a great number of calls related to power outages and equipment failures due to lightning strikes. […]
Business is in the process of really challenging the old conventions of employment. It used to be you were hired by a company, required to come into the office on a daily basis, complete your work and go home. For an increasing number of companies that is no longer a requirement. More and more firms are discovering the advantage to having a mobile workforce.
Has your company been thinking about moving some or all of your business processes into the Internet cloud?
Spam is one of the largest problems facing organizations which use the email as a primary communications tool.
As a society we have come a long way when it comes to understanding the importance of computer security. Most of us have the standard antivirus software installed and for the most part have figured out how to secure our wireless networks.