Need A New IT Company? Call Today! (403) 775-7444

IT Continues To Struggle with Shadow Apps

IT Continues To Struggle with Shadow Apps

The first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look. In the case of “Shadow […]

read more »

Have You Heard of FREAK Vulnerability? Find Out How It’s Been Threatening Systems

Have You Heard of FREAK Vulnerability? Find Out How It’s Been Threatening Systems

Microsoft has issued a HUGE WARNING for Windows users – have you taken notice? Cyber security experts began talking last week about a dangerous new vulnerability in many internet browsers. FREAK works by giving hackers and cybercriminals access to your supposedly private web traffic and network communications. This presents businesses and even private users with a […]

read more »

Leverage Tech to Increase Productivity

Leverage Tech to Increase Productivity

It has been said over and over, and proven by research and real life experience, that technology can be used to effectively increase productivity. One of the questions that is not often addressed is how a company, regardless of size, go from zero tech to productivity tech without interrupting the daily workflow and losing productivity […]

read more »

The Problem With Panda Antivirus

The Problem With Panda Antivirus

If you use Panda’s free antivirus software, you could be in some trouble. There’s a problem with the software in that it identifies itself as malware, and puts core files into quarantine. When it does that, if you reboot your PC, odds are good that it won’t boot up again. It won’t be able to, […]

read more »

DRAM Rowhammer Allows Hackers to Gain Kernel Privileges

DRAM Rowhammer Allows Hackers to Gain Kernel Privileges

Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before the hacking community can begin to exploit them. In this instance, the hack has nothing to do with software, but with RAM, making it an exceptionally dangerous, exotic bug. The technique, dubbed “Rowhammer” […]

read more »

Business Begins to Adopt Drones

Business Begins to Adopt Drones

The drones are coming. The FAA has now taken the first step toward making commercial use of drones a viable option. While they have yet to create a set of rules governing their use, they have issued guidelines, and they’ve begun to allow some companies regulatory exemptions so that they can begin experimenting with putting […]

read more »

Take Your Next Coffee Break On Us!

Down Arrow

Book Your Free Technology Consultation with Caffeinated and We Will Bring The Coffee!

Connect With Your Managed IT Service Team