Old Drivers Could Cause WiFi Issues After Windows 10 Update
Wednesday, 17 July 2019
Does your computer contain a Qualcomm wireless network adapter? If so, be aware that Microsoft is warning you that your system may suffer a sporadic loss of Wi-Fi connectivity after installing the Windows 10 update. The update was released in May 2019, stemming from an issue with out-of-date network drivers. If you haven’t yet installed
- Published in Uncategorized
No Comments
IT Defense in Depth Part II
Wednesday, 06 March 2019
Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of security incidences
- Published in Uncategorized
IT Defense In Depth Part I
Wednesday, 27 February 2019
In the 1930’s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t map every
- Published in Uncategorized
Penetration Testing vs. Vulnerability Testing Your Business Network
Wednesday, 30 January 2019
Hearing “all of your confidential information is extremely vulnerable, we know this because…” is bad news, but whatever follows the ellipses determines just how bad. Consider two scenarios. “All of your confidential information is extremely vulnerable… we know this because a hacker took all of your customers’ credit card info and locked all of your
- Published in Uncategorized
Loss of Data: Causes and Prevention
Monday, 10 September 2018
Loss of Data: Causes and Prevention The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing loved ones face-to-face on our computer screens. We can access and print our extremely
- Published in Uncategorized
Be Proactive: How to Avoid Potential Network Failures
Monday, 03 September 2018
Be Proactive: How to Avoid Potential Network Failures For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the
- Published in Uncategorized
5 Ways SMBs Can Save Money on Security
Monday, 20 August 2018
5 Ways SMBs Can Save Money on Security Small-to-medium sized businesses and large enterprises may seem worlds apart, but they face many of the same cyber-security threats. In fact, in recent years, cyber-criminals have increasingly targeted SMBs. This is because it’s widely known that SMBs have a smaller budget, and less in-house expertise,
- Published in Uncategorized
Four Key Components of a Robust Security Plan Every SMB Must Know
Monday, 13 August 2018
Four Key Components of a Robust Security Plan Every SMB Must Know Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has
- Published in Uncategorized
Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe
Monday, 06 August 2018
Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe Not too long ago, the New York Time’s website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of
- Published in Uncategorized
Stay Secure My Friend More Hackers Targeting SMBs
Monday, 30 July 2018
Stay Secure My Friend… More Hackers Targeting SMBs Many SMBs don’t realize it, but the path to some grand cybercrime score of a lifetime may go right through their backdoor. SMBs are commonly vendors, suppliers, or service providers who work with much larger enterprises. Unfortunately, they may be unaware that this makes them a
- Published in Uncategorized
- 1
- 2