Cyber security has become a hot topic for companies in need of IT services in Los Angeles. Whether you are a small or medium-size business, choosing the ...
In light of all the recent hacks (think Target and Sony, for example), online security has taken a huge step toward putting the emphasis on “security” with its newest revelation: facial recognition.
At CES, Intel discussed its purchase of digital identity manager PasswordBox and unveiled True Key, a password manager app that allows facial recognition to replace passwords on iOS devices, Windows computers, and Android phones.
Our lives are basically inside our iPhones these days, so it is vitally important that all users set up “Find My iPhone/iPad” in iCloud. Doing so will allow end users to locate their phones or “wipe it” remotely if it is lost or stolen.
The newest cyber threat is the appropriately-named "Heartbleed," a serious bug attacking OpenSSL (the open-source encryption protocol). Luckily DCG Technical Solutions, Inc. doesn't use OpenSSL for any of our sites, but some of our clients do. It's important for all of our customers to know that our service has been unaffected by this security breach.
The world is divided into two groups: those who have lost data and those who will. Lately we've been hearing more and more news reports of people losing data due to the Crypto virus, and we thought this is a good time to remind everyone of the utmost importance of backups.
Those of us at DCG continue to make your - and our - network security our highest priority. It's both simple and vital that you ensure both your home and business network is secure from malware, viruses and hackers.
The National Security Agency (NSA) published guidelines on network security that we feel are crucial when working to keep your network safe.
Smartphones have become a daily saving grace for most everyone, while at the same time can cause a catastrophe if lost or stolen. These mighty devices, which hold a tremendous amount of personal information, are easy to lose, easy to steal, and can easily fall victim to viruses and spyware.
There is a variety of blended threats in cyberspace, and it's important for you to know not only that you're protected, but that you're protecting yourself in the most cost efficient way.
In addition to viruses, there is the constant looming threat of malware.
Attention PC and Mac users: This applies to all of you.
Important updates have been released by both Adobe and Oracle to fix major security issues with their software. Oracle's Java plugin, as well as Adobe's Acrobat and Adobe Reader, were recently subject to hackers belonging to an Eastern European ring, with as many as 40 companies falling victim to the Java security breach on both Macs and PCs.
Those using Java on Windows systems are advised to remove Java altogether, or at least unplug it from the browser most often used.
Ransomware scams are on the rise, with 2012 seeing an increase in the number, size and scope of scams, according to anti-virus software giant Symantec.
Malware literally holds your PC hostage by locking or disabling it while displaying a demand for payment of a ransom, or what the crooks behind it call a "fine.
Ask yourself, "Will my business be able to recover all of it's data should a technological or natural disaster occur tomorrow?" Even if your answer is yes, how long will the restore take and will you be operating at 100% as quickly as you would like?
We are forever adjusting our business practices as technology grows, especially with all of the efforts by many clients to go "paperless" with invoicing, correspondence, and even contracts.