Old Drivers Could Cause WiFi Issues After Windows 10 Update
Wednesday, 17 July 2019
Does your computer contain a Qualcomm wireless network adapter? If so, be aware that Microsoft is warning you that your system may suffer a sporadic loss of Wi-Fi connectivity after installing the Windows 10 update. The update was released in May 2019, stemming from an issue with out-of-date network drivers. If you haven’t yet installed
- Published in Uncategorized
No Comments
Cinch I.T. Franchise Owner Excited to Serve Businesses in Woburn Massachusetts
Monday, 01 July 2019
Cinch I.T.’s newest office is officially open and serving businesses in and around the Woburn, Massachusetts area. Owner and Regional Director, Jay Small, has been serving customers in this area for over a year but has now officially opened his own franchise location. Jay was previously a Senior Account Manager for Cinch I.T. delivering consulting,
- Published in Awards
Cinch I.T. Ranked Among World’s Most Elite 501 Managed Service Providers
Thursday, 20 June 2019
12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services JUNE 18, 2019: Cinch I.T. has been named as one of the world’s premier managed service providers on the prestigious 12th-annual Channel Futures MSP 501 rankings. Every year, MSPs worldwide complete an extensive survey and application to report their product
- Published in Awards
IT Defense in Depth Part II
Wednesday, 06 March 2019
Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences
- Published in Uncategorized
IT Defense In Depth Part I
Wednesday, 27 February 2019
In the 1930’s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t map every
- Published in Uncategorized
Penetration Testing vs. Vulnerability Testing Your Business Network
Wednesday, 30 January 2019
Hearing “all of your confidential information is extremely vulnerable, we know this because…” is bad news, but whatever follows the ellipses determines just how bad. Consider two scenarios. “All of your confidential information is extremely vulnerable… we know this because a hacker took all of your customers’ credit card info and locked all of your
- Published in Uncategorized
What is the Cloud: A Simple Analogy
Monday, 17 September 2018
You use the cloud and don’t even know it. Do you go to Amazon and create a wishlist? Do you have an email account on Yahoo? That is cloud computing. All your emails are stored on Yahoo servers somewhere. They are on physical servers, of course, but they aren’t on your laptop. The advantage is
- Published in Tech Blog
Loss of Data: Causes and Prevention
Monday, 10 September 2018
Loss of Data: Causes and Prevention The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely
- Published in Uncategorized
Be Proactive: How to Avoid Potential Network Failures
Monday, 03 September 2018
Be Proactive: How to Avoid Potential Network Failures For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the
- Published in Uncategorized
5 Ways SMBs Can Save Money on Security
Monday, 20 August 2018
5 Ways SMBs Can Save Money on Security Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise,
- Published in Uncategorized