Call 980-407-5488
Blog
April 10, 2015 by Vertical Axion
Mobile phones play an ever-increasing role in the operations of businesses. Not just for communication any more, smartphones are used to access data; to record video, audio, and still images and play them back; to help with meeting agendas and travel schedules; and to find everything from your client’s jobsite to local restaurants while traveling. […]
Read more »
Tagged
April 8, 2015 by Vertical Axion
Disaster recovery plans have been around long before the creation of the cloud. Back in the days of early personal computing, paper was the main source of data storage that companies depended on to recover critical company information in the event of a disaster. The location of the stored data was usually in a physical […]
April 6, 2015 by Vertical Axion
With smartphones becoming more and more about data storage and access than just simply communication, businesses are finding that these “pocket computers” are proving to be not just handy, but vital, to their survival in a need-it-now world. But revelations that tech companies were sharing emails, text messages, and other information with the National Security Agency […]
April 2, 2015 by Vertical Axion
The idea of corporate management being delusional about the security of their networks seems almost laughable given the state of the recent successful cyberattacks against companies such as Home Depot, Target, and even Adobe. Yet the network giant Cisco reports that management believes that their networks are secure. Investigations into the security processes as major […]
March 31, 2015 by Vertical Axion
Many SMB’s and corporations have shied away from allowing or utilizing Android devices in the workplace, due to their possible security risks. Most of the security risks involved with Android are related to the open development nature of the system, which allows hackers easier access to the OS and makes it easier for them to […]
March 27, 2015 by Vertical Axion
Make no mistake about it. Adobe is an excellent company, and they’re very good about releasing patches, especially when security is at risk. Unfortunately, they’ve had to be. Adobe’s Flash technology has been the way in for a number of high profile hacking attacks that have revealed gaping holes in security and raised questions as […]
March 23, 2015 by Vertical Axion
Like them or not, wearables are coming. Sales projections have them reaching as high as 130 million units across all types of wearable devices by 2018. The problem is that with wearables come some serious security risks that towers above anything we’ve seen so far. A New Type of Risk Right now, in today’s world, […]
March 21, 2015 by Vertical Axion
Wi-Fi security has become both a hot topic and a major area of concern for both small businesses and individual consumers. A glance at the list of Wi-Fi connections that pop up on a user’s computer will show varying levels of security and the number of computers that are within range of accessing your computer’s […]
March 19, 2015 by Vertical Axion
The first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look. In the case of “Shadow […]
March 16, 2015 by Vertical Axion
Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before the hacking community can begin to exploit them. In this instance, the hack has nothing to do with software, but with RAM, making it an exceptionally dangerous, exotic bug. The technique, dubbed “Rowhammer” […]
March 13, 2015 by Vertical Axion
There’s a new SSL security flaw that’s making the news, and as usual, it has the major tech companies scrambling to provide patches. In some cases, patches are available now. In others, they’re still about a week away. Here’s what you need to know and how to guard against it. Background This latest security flaw […]
March 12, 2015 by Vertical Axion
The great problem with free apps is that they’re often developed by very small companies. That’s not an inherently bad thing, but these tiny development houses usually can’t afford to do a lot of QA and bug fixing or checking. Often, that can lead to free apps that have giant security holes in them. Security […]
March 11, 2015 by Vertical Axion
Most people are of the opinion that credit card transactions are fairly secure, in spite of the fact that over the past eighteen months there have been a number of fairly large breaches in which millions of customer transactions were exposed. The reality is that mobile payments on platforms like Apple Pay, are even more […]
March 6, 2015 by Vertical Axion
Big Data became big news in 2014. Thanks to the ever-expanding Internet of Objects, companies are finding it increasingly easy to collect massive amounts of data on everything from customer web surfing habits to the average tire pressure in the global automobile fleet, and pretty much everything in-between. We’ve seen some exciting developments over the […]
March 2, 2015 by Vertical Axion
Malware has become one of the largest threats to businesses with the number of attacks on both Windows and Mac machines increasing every single day. Linux is not even immune these days as many are hackers creating and exploiting flaws in that operating system as well. In business, these malware threats can pose a large […]
February 28, 2015 by Vertical Axion
While it may be beneficial to some companies to use in-house IT infrastructure, most business owners will find it is much more effective to outsource their IT needs. IT outsourcing includes hardware, software, database administration, cloud computing, inventory management software, website management, etc. In this article, we will discuss the five key benefits to outsourcing […]
February 27, 2015 by Vertical Axion
Today, more users are storing their data on the Internet than ever before. Instead of housing their pictures, movies and other important documents on data drives in their homes, they are shifting that storage online to one or more of the many cloud storage options available. Businesses have slowly begun to follow suit and are […]
February 23, 2015 by Vertical Axion
Malware threats have exploded in recent months targeting not just computers, but also your smart phones and tablets. Now, a new threat has emerged that allows criminals to encrypt devices until a ransom is paid. This ransom is usually demanded in bitcoins rather than in than U.S. currency because it cannot be traced. How Does […]
February 20, 2015 by Vertical Axion
The well-publicized net neutrality debate is coming to a close. At the core of the debate are two key issues. One is whether an Internet Service Provider (ISP) can provide higher access speeds for select web sites. The second is the idea of “paid prioritization,” in which access to select web sites can be prioritized […]
February 18, 2015 by Vertical Axion
Effective antivirus software is one of the first choices you should make for your organization. Keeping your data safe and ensuring that your company computers are always up and running free from viruses and other types of malware should be at the top of every business owner’s list. Good antivirus software can help you keep […]
February 14, 2015 by Vertical Axion
More than ten years ago, the most common forms of malware attacks were those that were initiated by way of macros. Macros, in case you are unaware of what they are, are little bits of VB code that are used to automate repetitive processes in applications like Microsoft Word and Excel. Back in the day, […]
February 13, 2015 by Vertical Axion
Smart devices are wonderful. The latest smart phones all have virtual assistants you can just ask questions rather than bothering with the whole typing thing. That’s both fantastic and convenient. The day’s coming when keyboards will be relegated to the dustbin of history. It’s not just smartphones, either. Television manufacturers have done a remarkable job […]
February 11, 2015 by Vertical Axion
When looking at cloud computing options for your business, you should examine the benefits and the drawbacks of both public and private cloud services. A public cloud gives you the flexibility to work from virtually anywhere and share and collaborate on data with many different people. A private cloud, on the other hand, gives you […]
February 10, 2015 by Vertical Axion
In the wake of the now-infamous Sony hack, many new security vulnerabilities are being found across a wide range of devices. Check Point Software Technologies recently revealed a flaw found in millions of routers in use across the Internet that allow hackers to take control of the devices. The vulnerability, being called “Misfortune Cookie,” has […]