Whether you are looking to install a business phone system or replace an old model with a new phone, you will need to understand the options that are ...
Mobile technology plays a huge part in daily business. We have at our fingertips enhanced productivity, immediate access to data and apps, and the ability to co-function with others at remote locations. However, things can get tricky when managing the flow of communications to and from these devices.
Data Breaches of 2015 -- The Top 10 Worst IT Hacks of the Year
Did you know the average total cost of a data breach is up over the past two years, increasing by 23%? That's total $3.79 million.
Premera Blue Cross – January. The first of three major healthcare breaches to make the list, this example was believed to be triggered by a phishing scheme that infected victims with malware.
Image courtesy of Stuart Miles at FreeDigitalPhotos.net
Tech Talk with Tom - The Wild Web
By Tom Slaughter – Owner of Earth Oasis Computers
In the Wild West of the late 1800s, everyone knew you must - always - be on the watch for ruffians and outlaws.
Image courtesy of Renjith Krishnan at FreeDigitalPhotos.net
To be blunt, your IT guy MUST carry cyber liability coverage. If he doesn’t, he is exposing your businesses to potentially catastrophic cyber threats.
It has always been a fact that employees waste some of their time at work on their own personal agendas—especially since the advent of the Internet. Google surfing, Facebook checking, LinkedIn updating, online shopping, and general web exploration are, unfortunately for business owners, commonplace for a significant chunk of their employees’ workdays.
What is "drive-by" malware, you ask? It's something you unknowingly expose yourself to every time you're on the Internet.
When you're on your computer or phone and check out (i.e. "drive-by") a seemingly innocent, unthreatening web page, even if you simply read the content on the page without clicking links on that page, a minuscule, unnoticeable-yet deadly virus can infect your device.
In light of all the recent hacks (think Target and Sony, for example), online security has taken a huge step toward putting the emphasis on “security” with its newest revelation: facial recognition.
At CES, Intel discussed its purchase of digital identity manager PasswordBox and unveiled True Key, a password manager app that allows facial recognition to replace passwords on iOS devices, Windows computers, and Android phones.
Our lives are basically inside our iPhones these days, so it is vitally important that all users set up “Find My iPhone/iPad” in iCloud. Doing so will allow end users to locate their phones or “wipe it” remotely if it is lost or stolen.
The newest cyber threat is the appropriately-named "Heartbleed," a serious bug attacking OpenSSL (the open-source encryption protocol). Luckily DCG Technical Solutions, Inc. doesn't use OpenSSL for any of our sites, but some of our clients do. It's important for all of our customers to know that our service has been unaffected by this security breach.
The world is divided into two groups: those who have lost data and those who will. Lately we've been hearing more and more news reports of people losing data due to the Crypto virus, and we thought this is a good time to remind everyone of the utmost importance of backups.