The 4 Mythic Characters of IT

The 4 Mythic Characters of IT Company owners often view IT through the lens of headache cure or damage control. And yes, when you’re dealing with the pain of unstable systems built on outdated equipment, all you want is relief. But when you only look to your IT team for palliative care, you may miss the opportunity to tap some…

Read More icon

Crypto Ransomware Threats: A Growing Concern

Crypto Ransomware Threats: A Growing Concern We just wanted to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients have been affected, but businesses in many industries (including banks, hospitals, and government institutions) have. The fallout has included loss of money, time, reputation, and public trust. "Locky," "Robin Hood," "Bart"....you…

Read More icon

Protect Yourself From Heartbleed

Protect Yourself From Heartbleed You've probably seen some of the security alerts regarding the Heartbleed Bug. This security vulnerability involves the widely used encryption software known as OpenSSL. OpenSSL is used to encrypt communications on the web, with the purpose of protecting you and your loved ones from hackers and the like. This massive security issue has been estimated to…

Read More icon

Smart Methods for Password Creation

We all know it can be challenging to come up with secure passwords that will protect your information from online crooks. The crooks are, in fact, becoming more and more savvy with each passing year. To protect your information, you should choose secure passwords that comply with high standards of protection. Here are a few recommended methods that can help…

Read More icon