As you may be aware by now, technology and the internet itself are an ever evolving nucleus. We as humans have the option to evolve and grow with it (to understand how it works and how we can leverage it to work for us). Or, we can remain primitive, using what we feel works for […]
Salutations everybody! Today’s topic is about phishing campaigns. Imagine for a moment, you work in an office and respond to e-mail and phone calls all day long. One day, you open up a message that looks to be from your administrator telling you to reset your password. Thinking nothing of it, you click on the […]
Network audits can save businesses a lot of headache. Imagine for a moment, you own or manage a small business that provides the option to pay with credit cards; storing card numbers and payment history that go in a database. Or, you run a dental office that takes x-rays of patients that get put into […]
Finding the right Managed IT Services Provider (MSP) can be tedious and time-consuming. Two glaring issues that arise with Managed IT Service Providers, is trust and cost. A lot of companies prefer to keep their data ‘in-house’ so as not to have to entrust their data in the hands of an external person or business. […]
Salutations everyone! In a previous blog I briefly mentioned how we are creatures of habit. We prefer convenience over security. And that is partly why so many attackers are relying on us to set up poor authentication such as using a weak password. Today we are going to discuss why it is integral to have […]
Greetings everybody! Welcome to this momentous occasion; our inaugural blog! You may be wondering – what treasure trove of information am I about to stumble upon? Or, who is this nut job blogging about technology? Or, aren’t there enough blogs out there discussing technology? All are apt questions. Yes, there are plenty of blogs discussing […]