Call 980-407-5488
Blog
March 21, 2015 by Vertical Axion
Wi-Fi security has become both a hot topic and a major area of concern for both small businesses and individual consumers. A glance at the list of Wi-Fi connections that pop up on a user’s computer will show varying levels of security and the number of computers that are within range of accessing your computer’s […]
Read more »
Tagged
March 19, 2015 by Vertical Axion
The first step in solving a problem that you have is admitting that you have it to begin with. To be able to do that, you have to be looking at the landscape in which the problem resides with eyes that want to see it and know where to look. In the case of “Shadow […]
March 16, 2015 by Vertical Axion
Google’s “Project Zero” security initiative is bearing fruit, unearthing security issues we’ve never seen before, in hopes of getting them patched before the hacking community can begin to exploit them. In this instance, the hack has nothing to do with software, but with RAM, making it an exceptionally dangerous, exotic bug. The technique, dubbed “Rowhammer” […]
March 13, 2015 by Vertical Axion
There’s a new SSL security flaw that’s making the news, and as usual, it has the major tech companies scrambling to provide patches. In some cases, patches are available now. In others, they’re still about a week away. Here’s what you need to know and how to guard against it. Background This latest security flaw […]
March 12, 2015 by Vertical Axion
The great problem with free apps is that they’re often developed by very small companies. That’s not an inherently bad thing, but these tiny development houses usually can’t afford to do a lot of QA and bug fixing or checking. Often, that can lead to free apps that have giant security holes in them. Security […]
March 11, 2015 by Vertical Axion
Most people are of the opinion that credit card transactions are fairly secure, in spite of the fact that over the past eighteen months there have been a number of fairly large breaches in which millions of customer transactions were exposed. The reality is that mobile payments on platforms like Apple Pay, are even more […]
March 6, 2015 by Vertical Axion
Big Data became big news in 2014. Thanks to the ever-expanding Internet of Objects, companies are finding it increasingly easy to collect massive amounts of data on everything from customer web surfing habits to the average tire pressure in the global automobile fleet, and pretty much everything in-between. We’ve seen some exciting developments over the […]
March 2, 2015 by Vertical Axion
Malware has become one of the largest threats to businesses with the number of attacks on both Windows and Mac machines increasing every single day. Linux is not even immune these days as many are hackers creating and exploiting flaws in that operating system as well. In business, these malware threats can pose a large […]
February 28, 2015 by Vertical Axion
While it may be beneficial to some companies to use in-house IT infrastructure, most business owners will find it is much more effective to outsource their IT needs. IT outsourcing includes hardware, software, database administration, cloud computing, inventory management software, website management, etc. In this article, we will discuss the five key benefits to outsourcing […]
February 27, 2015 by Vertical Axion
Today, more users are storing their data on the Internet than ever before. Instead of housing their pictures, movies and other important documents on data drives in their homes, they are shifting that storage online to one or more of the many cloud storage options available. Businesses have slowly begun to follow suit and are […]
February 23, 2015 by Vertical Axion
Malware threats have exploded in recent months targeting not just computers, but also your smart phones and tablets. Now, a new threat has emerged that allows criminals to encrypt devices until a ransom is paid. This ransom is usually demanded in bitcoins rather than in than U.S. currency because it cannot be traced. How Does […]
February 20, 2015 by Vertical Axion
The well-publicized net neutrality debate is coming to a close. At the core of the debate are two key issues. One is whether an Internet Service Provider (ISP) can provide higher access speeds for select web sites. The second is the idea of “paid prioritization,” in which access to select web sites can be prioritized […]
February 18, 2015 by Vertical Axion
Effective antivirus software is one of the first choices you should make for your organization. Keeping your data safe and ensuring that your company computers are always up and running free from viruses and other types of malware should be at the top of every business owner’s list. Good antivirus software can help you keep […]
February 14, 2015 by Vertical Axion
More than ten years ago, the most common forms of malware attacks were those that were initiated by way of macros. Macros, in case you are unaware of what they are, are little bits of VB code that are used to automate repetitive processes in applications like Microsoft Word and Excel. Back in the day, […]
February 13, 2015 by Vertical Axion
Smart devices are wonderful. The latest smart phones all have virtual assistants you can just ask questions rather than bothering with the whole typing thing. That’s both fantastic and convenient. The day’s coming when keyboards will be relegated to the dustbin of history. It’s not just smartphones, either. Television manufacturers have done a remarkable job […]
February 11, 2015 by Vertical Axion
When looking at cloud computing options for your business, you should examine the benefits and the drawbacks of both public and private cloud services. A public cloud gives you the flexibility to work from virtually anywhere and share and collaborate on data with many different people. A private cloud, on the other hand, gives you […]
February 10, 2015 by Vertical Axion
In the wake of the now-infamous Sony hack, many new security vulnerabilities are being found across a wide range of devices. Check Point Software Technologies recently revealed a flaw found in millions of routers in use across the Internet that allow hackers to take control of the devices. The vulnerability, being called “Misfortune Cookie,” has […]
February 9, 2015 by Vertical Axion
Today, companies are able to collect massive amounts of data about their customers and their shopping habits. This data can provide companies with valuable insights into what products they could sell and how they should market those products to consumers. However, there are a few problems in the collection of data for many companies seeking […]
February 6, 2015 by Vertical Axion
With the advancement of technology comes a host of new problems that IT leaders must tackle. In the past, IT leaders have had to wrestle with a variety of issues, from what types of computers to buy to how many servers they should use to ensure a strong internal network. Today, times have changed and […]
February 3, 2015 by Vertical Axion
The Internet of Things hopes to bring a new wave of connectivity options to seemingly mundane devices including your refrigerator and other household appliances. This new age of connected devices has already begun – thermostats have already been released that make your home or office “smart”, allowing you to control them with your smartphone from virtually […]
January 30, 2015 by Vertical Axion
There is a myth that abounds in the world of Mac that has been encouraged by Apple: Mac users don’t have to worry about malware or other virus threats. While it is true that Mac users face far fewer malware threats when compared to Windows users, Macs today aren’t immune, and users can easily fall […]
December 26, 2014 by Vertical Axion
Viruses have been a threat to computers since the first floppy disk and today they have never been a bigger problem for both individuals and especially, for businesses. First, antivirus solutions were designed for desktops scanning each individual system periodically. Next came more enterprise level capabilities with the need for antivirus software to scan servers […]
November 25, 2014 by Vertical Axion
News of data breaches in companies large and small has been regularly making the weekly headlines over the last few months. One survey estimates that 43 percent of all companies have experienced some type of data breach in 2013. The spate of bad news is getting under the skin of consumers who want more to […]
November 10, 2014 by Vertical Axion
Mobile phone theft has become a growing problem across the world with an estimated $7 million worth of phones lost or stolen each year. This trend is expected to grow as more and more of the world adopts a mobile lifestyle and begins carrying smartphones and tablets with them wherever they go. However, mobile phone […]