Protect Your Network by Building a Strong Password Policy

Passwords are like the keys to your company’s network. Your users use them to log in to computers, access email, and connect remotely via VPN. And just like the key to the front door of your offices, a password in the wrong hands can allow unwanted “visitors” into your network -- where they can steal confidential information, destroy data, and expose your company to liability.

March Madness Hacker Scam

The latest hacker scam is March Madness!  It seems that hackers like to capitalize on current popular events. Recently, it was the Winter Olympics, Valentine’s Day – well, now it’s March Madness!
So, hackers are now spoofing popular March Madness websites, and that includes bracket sites and live game streaming.

Firewall: Don’t Leave the Windows Open

A computer without a firewall is like leaving the doors open, the windows down and the keys in the ignition of your car. You might as well leave a sign that says “steal me!”
Protecting your computer systems from malicious users intent on disrupting your operations or -- even worse -- stealing your private data or intellectual property must be an IT priority.

Private Cloud Vs. Public Cloud Computing

Everyone agrees that there are many benefits to cloud computing, but whether to manage resources in a private or public cloud solution is the question.
Public Cloud Computing
Public clouds such as Amazon EC2 and Microsoft Azure have a number of benefits:

Utility Model –                                                                                                     With a Public Cloud, users pay by the hour for computer resources.

New IT Trends for 2018!

Not only is it a New Year, but there are new IT trends for 2018!
In 2018, according to Quantum Run, a number of technology breakthroughs and IT trends are happening around the world, for example:

There will be one Wi-Fi hotspot for every 20 people.

Who will expose your business to Cybercrime?

Kon Leong at Harvard Business Review writes an excellent article on cybercrime. He points out the problem of employees exposing your business through human error.

He said: "Today, cybersecurity has expanded far beyond its traditional domain of external threats, typified by external hackers attacking network vulnerabilities.

Is the Cloud Secure?

Companies of all sizes and from all industries have started to migrate to the cloud, but is the cloud secure?

Placing servers, data and applications on the cloud can improve operations. However, this move is not without risk. Security best practices must be in place.

No More Windows 7

As a proactive managed service provider, we take care of your office.
Microsoft announced a few years ago that it would no longer be providing support for Windows 7. For that matter, they aren’t supporting Windows 8 any more either. They really want everyone to be on Windows 10 but most likely that will become unsupported sooner than later as well.

Is your Face a key or a passcode?

Recently Apple announced a new feature for iPhoneX – facial recognition. Facial recognition in place of a fingerprint or passcode. The idea of using your face as an ID raises some interesting new legal issues.

For example, the police arrest you and want to access to your phone, all they would need to do is hold it up to your face to open it.