239 244 9600 Mon. - Fri. 9AM - 5PM

Marriott Hotel Hack

Marriott Hotels Exposed 500 Million Customer Records. Make Sure Your Business Doesn’t Suffer the Same Fate. Up to 500 million travelers could be compromised as hotel chain Marriott International have announced a security breach in their guest database. Analysts recently alerted the firm to a vulnerability that has granted hackers access to the hotel chain’s systems since 2014. The firm announced their Starwood Preferred Guest (SPG) loyalty program was compromised for an extended period which left customers vulnerable. The…

Read More >

Buying Tech in Time for Christmas

Buying Tech in Time for Christmas Christmas time is back with us again. The latest devices and gadgets are hitting store shelves just in time to keep up with the rush. Magazines, television, and the web are brimming with advertisements and reviews of the latest tech your money can buy. Before you rush out to buy the gadgets you’ve been waiting all year for, consider a few important questions before parting with your hard-earned cash. Does This Technology Do…

Read More >

Protect Your Firm Against Zero-Day Attacks

Protect Your Firm Against Zero-Day Attacks Protecting your business against the latest IT threats should always be a top priority. Updating antivirus and patching your operating system is a great way to start. What happens, however, when a threat appears at your door before security firms have had a chance to catch it? A security threat that exploits a previously undiscovered vulnerability in the computer is known as a zero-day threat. The name “zero-day” is designed to imply how…

Read More >

Protecting A Business from Internal Threats

Protecting A Business from Internal Threats When considering IT threats to your business many articles focus on hackers, viruses, and attacks from external threats. These dangers are real, constant, and easily identifiable. In many cases, however, the largest threat to a firm comes from inside the business itself. People inside the firm often pose the largest single threat to systems and security. These individuals often have trusted access and a detailed working knowledge of the organization from the inside….

Read More >

Is Your Laptop Running Hot and Loud?

Is Your Laptop Running Hot and Loud? Laptop computers commonly heat up a little in normal operation. Electronic components, including large capacity batteries, become warm in use. Your laptop should never become too hot to handle though. When a laptop turns hot to the touch or starts to sound like a jet engine, it’s likely beginning to overheat. Modern laptops use nearly silent fans to cool components and keep the system is comfortable and safe to use. In some…

Read More >

More Than A Virus, Common Malware to Watch Out For

More Than A Virus, Common Malware to Watch Out For The term “virus” is often used to describe many different types of infection a computer might have. Virus, when used as a blanket term, can describe any number of potential computer programs. What these programs have in common are they are typically designed to cause damage, steal data, or spread across the network. Malware describes software designed to act maliciously on a personal computer. The name ‘malware’ is a…

Read More >

How Losing a Mobile Device Puts Your Entire Business at Risk

How Losing a Mobile Device Puts Your Entire Business at Risk Losing a mobile phone or laptop is an experience that everyone dreads. The expense and inconvenience of buying a new device is unpleasant, but only represents a fraction of the damage done when a device is misplaced. The cost of data contained within every device can add up to many times more than the total value of the device itself. Chances are, you already use automatic login on…

Read More >

Are Registry Cleaners a Good Idea?

Are Registry Cleaners a Good Idea? You have likely been alerted by popups while browsing the web. These, often flashing, advertisements claim your computer has more than a thousand errors requiring urgent attention to fix. Perhaps helpfully, these popups offer a solution to cure your computer with a click of the mouse. Buttons marked “fix now” appear to offer a simple fix to all your computer troubles. These advertisements are often described as Registry Cleaners, or by a few…

Read More >

How to Tell if You’ve Gotten Hacked

How to Tell if You’ve Gotten Hacked Being hacked is the single biggest fear of most computer users. Many believe the first sign of strange behavior or errors on their PC is a sign hackers have taken control. But are hackers really inside your machine, stealing your information? Or should we be on the lookout for more subtle signs? What does being hacked really look like? There is an important distinction to make between being hacked by a person…

Read More >

Why 2-Factor Authentication is Important

Why 2-Factor Authentication is Important You hear about hacks all the time. The news covers major websites who have had data leaks containing your email and password. Computers get infected and capture your login details for bank accounts and credit cards. In the worst cases, identity theft occurs because it is an easy crime to commit with a high reward. In 2018, the passwords you used to trust to keep the bad guys out of your accounts are not…

Read More >