Call 980-407-5488
Blog
June 17, 2015 by Vertical Axion
It is no secret that hackers, the bad kind, seem to be everywhere. From local businesses trying to spy on their competitors to international peepers from anonymous foreign countries, every business and personal computer is under attack. In most cases, the goal is obtaining information for sale, whether it is to be sold on the […]
Read more »
Tagged
June 16, 2015 by Vertical Axion
It seems that no security company is safe from hackers as LastPass finds itself among the recent high profile hacks. If you’re not sure what LastPass is, it’s a secure password service. You generate a Master Password, and use it to securely store all your other passwords. It’s convenient, because it leaves you only having to […]
June 13, 2015 by Vertical Axion
It may come as a surprise to many, but the source of most small business data breaches – about 80 percent – come from employees who either violate protocol or misuse their access privileges and use company computers for personal use. More than one of the data breaches that have made the news involve an […]
June 12, 2015 by Vertical Axion
It’s no secret, in the Data Security vs. Hacker war, the hackers are winning. Every year, we see more and more data breaches occurring on an ever larger and grander scale. Every year, we hear about how companies are taking steps to better secure their data and the data their customers share with them, but […]
June 8, 2015 by Vertical Axion
BYOD, also known as Bring Your Own Device, is a growing trend in the modern business environment. It has been an issue as younger people, often referred to as digital natives, enter the workforce and bring with them years of experience with technology. Combined with the fact that the baby boomers are now leaving the […]
June 5, 2015 by Vertical Axion
One of the most often overlooked security holes in many companies is through third party providers. Companies may have a comprehensive security policy in place for their internal networks, with provisions for mobile devices and a great data loss prevention strategy, but may leave themselves wide open when it comes to the third party security. […]
June 2, 2015 by Vertical Axion
Do you know what the first thing you would do if your business got hacked? Have you planned for this eventuality or even thought about it? While it’s not a very pleasant thing to contemplate, with the abundance of computer hacks happening every day, it’s not something you can afford to not think about. It […]
June 1, 2015 by Vertical Axion
Microsoft is ending support for Windows Server 2003 on July 14, 2015. Losing maintenance for Windows Server 2003 is a concern as Microsoft will not be providing critical maintenance patches to fix vulnerabilities being exploited by the hacking world. Microsoft is ending support in an effort to force users into a more modern operating system; […]
May 25, 2015 by Vertical Axion
Keeping our data safe and secure is a very serious matter, but there are a few things that can be done to keep precious information safe from external invasions as well as an unforeseen, internal malfunction. 1. Use some sort of a reactive software protection like anti-malware, which is just a basic requirement for all […]
May 23, 2015 by Vertical Axion
It’s not as though it’s a secret. More and more, companies are embracing the advantages of the cloud, both for data storage and for certain processing functions. There’s a good reason for that. Companies that do so are milking ever more efficiency out of their operations, and that helps add to the bottom line. Even […]
May 15, 2015 by Vertical Axion
Apple has added some intriguing features to their latest mobile product lineup, one of which is the fingerprint scanner. Its stated purpose is to heighten the security on the mobile phone. As the smartphone in general becomes increasingly integrated into the mobile office, making it harder to break in seems like a good idea. However, […]
May 13, 2015 by Vertical Axion
It’s convenient, it saves you and your company a few dollars over your personal or business mobile hot spots and it just pops up when you flip open your laptop or look at your tablet or smartphone. You may not even think twice before hopping on the Wi-Fi at your hotel, but perhaps you should […]
May 9, 2015 by Vertical Axion
In 2014 we saw numerous security breaches around the world. We saw the security compromised in such big names as Sony, Target, Goodwill Industries, Home Depot, JP Morgan and Michaels. For 2015, most security analysts are predicting an even greater increase in the number of security breaches and cyber-attacks. In the 2015 Cyber Threat Defense […]
May 7, 2015 by Vertical Axion
When you open the box on a new tablet, cell phone, netbook or laptop it is tempting simply to hit the start button and go. Unfortunately, doing that may be a big mistake, not because you need to read the instructional manual or pick out a waterproof case, but because there is a possibility that […]
May 6, 2015 by Vertical Axion
It is commonplace today to hear businesses voicing concerns about using cloud based services as though the cloud is much less secure than any system you might purchase or devise on site. In reality it is not the cloud or any other platform that determines how much of a security risk you are taking with […]
May 2, 2015 by Vertical Axion
Most experts in the data security field agree that a data breach is more likely than not to happen to almost every company. Far from being a death knell to the business that experiences it, a loss or compromise of data is quite survivable. The way you and your IT and other departments react to […]
May 1, 2015 by Vertical Axion
No new business today can operate without IT technology; the inconvenient truth is most new business owners are tyros when it comes to understanding how to integrate IT with their business’s operations. One area where knowledge is lacking and confusion reigns is that of protecting data from hackers. Today’s hackers are not the same as […]
April 29, 2015 by Vertical Axion
USB flash drives have been on the market for over a decade and are popular as a means of safely storing data in an effective, secure medium. As businesses increase their demand for flash drives, these drives are increasing their data storage and security capabilities exponentially. The great thing about flash storage devices is that […]
April 28, 2015 by Vertical Axion
The past few years have seen a growing number of high profile data breaches, costing the affected companies millions of dollars. Making it harder to recover from such a calamity is the loss of confidence the affected business experiences within its customer base. Most businesses have staff whose job it is to develop policies and […]
April 27, 2015 by Vertical Axion
With the rise of applications like Dropbox, OneDrive, Box, Google Drive, Apple iCloud, Spideroak and the like the question for many IT departments is not whether a business should move to the cloud, but when the transition should take place and with which provider. Interestingly, even though the cloud is talked about constantly in many […]
April 20, 2015 by Vertical Axion
Whether you are talking with Appleheads or Byteheads, the issue of the security of Apple’s operating systems has been a debate that has continued for decades. Many Apple computer users firmly state that their system has never been exposed to the plethora of virus and malware attacks Windows and other operating systems have become oddly […]
April 18, 2015 by Vertical Axion
Passwords everywhere, with every system, with every account you have. You forget your passwords, or they are weak passwords that are easily picked off. Your company’s IT department spends countless hours retrieving passwords. Now, with the upcoming release of Microsoft’s Windows 10, your IT department may have more time on its hands to handle more […]
April 17, 2015 by Vertical Axion
Ransomware is a type of malware that infects your computer and encrypts your data until you actually pay to have it removed. The first sign of trouble is usually some sort of text telling you that your computers data has been protected by a strong encryption and you will not be able to work with […]
April 16, 2015 by Vertical Axion
Distributed Denial of Service (DDoS) attacks have been around for a while, but since the turn of the millennia we have seen an increasing use of DDoS attacks that target large corporations, small businesses and even individual users. Firewalls and Intrusion Prevention Services (IPS) provide little to no protection against DDoS attacks and can leave […]