Entries by Info Admin

5 Steps for Developing a Successful BYOD Environment

Employees are using their personal smartphones, tablets, and other mobile devices for work much more often these days. This trend even has a name – “BYOD” (Bring Your Own Device). Gone are the days when employees were willing to carry a personal phone and a work phone, for example. In fact, industry research firm Gartner predicts that […]

Is Using Fingerprint Authentication a Good Idea?

The U.S. government recently announced that 5.6 million fingerprint records were stolen along with other valuable data from the breach they publicized earlier this year. Since many of your clients have iPhones that use fingerprint scanning for security, they may be wondering what could happen if their fingerprint data was stolen. With fingerprint authentication, you do […]

Widespread Apple Device Vulnerability Exposed

Apple Security Update! Apple has revealed a very serious flaw in the way its iOS devices (iPods, iPads, iPhones) handle secure connections, specifically when your device is connecting to a server via SSL (“https://”) or TLS connections. This vulnerability, just revealed and patched by Apple last Friday, allows for an attacker to create a “man […]

Managing Malware Threats on Your Web Servers

IT managers and security professionals are increasingly worried about targeted malware and its effect on business operations for their enterprise web servers. However, according to a recent survey by security firm Bit9, these professionals are decreasingly confident in their ability to identify and stop such security threats. Bit9’s server security survey found that targeted malware […]

Six IT Services to Outsource

With the economic climate in the US and Europe still uncertain, many small and medium organizations are looking at outsourcing business services now more than ever. Those organizations that have already outsourced parts of their IT operations are looking to outsource more, and those that haven’t are looking to start. One thing that stops or […]

Oh, the Risks of Public Wi-Fi

As technology goes more and more mobile, working remotely from public Wi-Fi locations is going to be a bigger and bigger part of doing business. Whether it’s your sales team using airport Wi-Fi while waiting for a flight, or your creative employees knocking out some work at a Starbucks over lunch, the risks of public […]

Client Alert – Cryptolocker Ransomware Outbreak

In the last few weeks, and with increasing frequency, our clients have been encountering instances of a new type of malware known as ransomware. The most popular of these, known as Crytpolocker, infects your computer and encrypts your data files on your computer as well as on any network shares you have connected with a drive […]

What Organizations Need to Know About the Looming Internet Taxes

The new Marketplace Fairness Act, or “Internet Tax” will require online retailers to collect sales taxes for the states where they ship goods, not just the ones where the seller has a presence. If you are a non-tax exempt organization that purchases or ships any of your products online, these new taxes will affect you. […]

How to Extend the Life of Your iPhone

Your iPhone is your connection to the world, your organization tool, and your technological toy. It’s also expensive. The only thing worse than the cost of constantly upgrading your iPhone to the latest version, is the cost of having to replace your current one due to damage. To keep this wondrous gadget in top form, […]

Insider Threat Risks to Your Organization

Business owners and IT managers are well aware of the threats posted by hackers and cybercriminals to their networks, and most are taking steps to secure their organizations and to ward off these outside threats. However, sometimes the biggest threat to your company comes from within the walls of your office. A recent study funded […]