Does the Recent Amazon Outage Show a Need for Better Planning?
The incident concerning Amazon’s S3 Service shows that it is dangerous to put all your resources on one service. So, it makes sense while your company may use one provider for web services it uses another provider for backup and disaster recovery services. On February 28, 2016, users of Amazon Web Services went […]
Weekly Tech Tip: Protect all pages on your public-facing websites, not just the checkout and sign-up pages
How Managed Services Helps Small and Medium-sized Businesses Thrive
Small and medium-sized businesses often don’t have the budget or a justification for a full-time IT department and are turning with ever-increasing regularity to cloud-based computer managed IT services. It was the mid-twentieth century when computers began finding footholds in business operations. Most often, computers were used for back office operations. Today, computers are ubiquitous […]
How Auto-Fill Can Leave Your Business Vulnerable to a Phishing Attack
Relying on the pervasiveness of auto-fill, hackers have developed a new phishing technique that uses this standard browser feature and which could put your business’ data security at risk. Many employees rely on their web browser’s auto-fill feature to make day-to-day Internet tasks easier and more convenient. From Safari and Firefox to Google Chrome and […]
How to Use Your Chrome Browser to Your Advantage
Your Chrome browser has many settings to protect your privacy and keep advertisers from viewing your browsing history. Google’s Chrome web browser is popular for many reasons. It’s a fast, efficient browser and includes a wide library of extensions available to the more savvy internet user. From reduced memory usage to being able to hide […]
Weekly Tech Tip: Create a mobile device action plan
Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for […]