Remote Monitoring

One of the services that we provide our clients under a Managed Services Plan (MSP) is remote monitoring of components in their system. The reason our clients choose to be on a MSP is to keep the computer system running efficiently at all times. This is achieved by defined periods of maintenance and by detecting problems before they create downtime. One way we keep a More »

Deleting Data Permanently

No this is not an ad for a new video game but it would be a great movie title! I want to highlight our process of deleting data permanently off storage devices. Why should you care? Data on storage devices can be recovered even if deleted. The normal delete process does not actually remove any data, just the pointer to the data*, as a result, More »

Texting Cyber Attacks

Recently, we have seen a number of text messages come across our mobile phones that, if opened, can create problems for you. Example #1 “Hi, it’s Fido: You’ve been refunded 10.15$ due to an overcharge on your last bill. Click here to claim your funds:” Notice that the $ sign is behind the dollar amount instead of in front. Example #2: “A purchase has More »


Here is our May 2018 Newsletter: Well, it looks like spring has finally sprung!  We now have warmer and longer days, we all seem to have more energy and there is that sense of optimism and the desire to do ‘spring cleaning’. Sometimes that spring cleaning is getting out the BBQ or giving the car a good cleaning … we should also think of doing More »

Meltdown and Spectre

Widespread microprocessor flaws called Meltdown and Spectre have been recently identified. These vulnerabilities are related to the architecture of the processor ship installed in your computer.  These vulnerabilities allow hackers to potentially “observe” passwords and other sensitive personal data on computers It was discovered by Google several months ago. This affects owners of both Windows PCs and Apple Mac computers built with Intel, ARM and More »


Here is some news about the KRACK Hack that affects all wifi devices. All wifi devices usually implement a security protocol called WPA2. There is a vulnerability that exists in the WPA2 protocol so it is an exploit of the protocol design, not a flaw in the implementation of the protocol that is creating an issue. It has been there since wifi WAP2 was created More »


Experian Site Can Give Anyone Your Credit Freeze PIN   Renowned security expert Brian Krebs recently discovered that credit bureau company Experian makes it easier than you think for someone to request the (PIN) needed to unlock a consumer credit file that was previously frozen, compromising important consumer data. Krebs shows how this is done, recommends putting a freeze on your credit files, and talks More »

Scam Artist

Former Scam Artist Has a Warning for Today’s Consumers   Frank Abagnale Jr., whose life as a scam artist was featured in the movie ‘Catch Me if you Can’, is now a top cybersecurity expert who has worked with the FBI for over 40 years. Read this interesting interview from the Wall Street Journal to learn more about Abagnale’s life, and how he thinks consumers More »

AI Future

Prepare Your Business for the AI Future   Margaret Harris, a director of content strategy at Oracle, recent wrote in Forbes that it’s vital for businesses to properly prepare for the new AI future. Companies can move forward with AI without putting too much time and money into faulty projects. Learn several recommendations from Oracle experts on how to move forward with this emerging technology. More »

Handling Disruption

Handling curve balls and implementing change is difficult for any business. While there’s no silver bullet, leadership expert Susan Fowler believes that transforming your staff into proactive self-leaders can help you meet this challenge. Fowler says that proactive self-leadership skills are teachable, details the benefits of doing so, and gives 3 ways you can begin teaching people these vital skills. Click here to read more. More »

  • 1
  • 2


Copyright © 2017-2019. All rights reserved.