Call 980-407-5488
Blog
August 5, 2015 by Vertical Axion
If you’ve heard it once, you’ve heard it a thousand times. Mac’s are just “safer” than PC’s. They’re less prone to viral and other types of hacking attacks. This has, in fact, been a major selling point for the machines, and Apple has used it to good advantage. The problem is, it’s not true, generally […]
Read more »
Tagged
July 28, 2015 by Vertical Axion
You are opening up your own business, or your small business has decided to start accepting credit cards to make purchases more convenient for customers. What steps will you take to garner your customers’ trust that their credit card data are secure and remain confidential? PCI Data Security Standards First, as a new business accepting […]
July 27, 2015 by Vertical Axion
So which is right for your business: virtualization or cloud computing? Do you know the difference? No? That’s okay; a lot of people who don’t work in IT don’t know the difference either. The word “cloud” is thrown around so often that sometimes people aren’t sure how “virtualization” fits in, and the two get confused […]
Beginning on Monday, July 27th and throughout this week we will be remotely upgrading all the antivirus protection on our customer’s systems with a newer version of the agent software. As part of the upgrade process, you will see your MAV icon changed to look like the blue and white shield shown here on the […]
July 21, 2015 by Vertical Axion
Anyone who’s even loosely associated with the tech industry knows that there’s no such thing as privacy on the web. Most government agencies have, at this point, been hacked. Private companies from banks to insurance firms, with state-of-the art protection have been breached, data stolen, customer trust destroyed. The independent TOR project, whose primary goal […]
July 15, 2015 by Vertical Axion
The best way to handle the potential for a data breach is to plan for such an event. Working with all of your employees to make certain they are mindful of how their activity can heighten or reduce the chance of an outsider threatening your or your customers’ information. Take the opportunity to review your […]
July 11, 2015 by Vertical Axion
With the increases in network security breaches in the last few years, it is imperative that businesses become more aware of how these breaches are happening and what steps can be taken to prevent them. While there is no 100% fool-proof way of stopping every kind of security breach, with a little knowledge and foresight, […]
July 10, 2015 by Vertical Axion
In today’s increasingly mobile business world, there is always a risk of losing important data to malware attacks, accidents or end-user negligence. With advanced technology, however, businesses can minimize their risk of data loss by identifying and monitoring data and putting in place certain safeguards to help protect it from loss. Your data are the […]
July 9, 2015 by Vertical Axion
What harm could there be in free software? Everybody’s cost-conscious these days, right? Why not help your bottom line by using freebies? Wrong. Free software is one of the most dangerous things you will run into while operating your business. This is not to say trial offers, or any shareware products, are to be avoided, […]
July 8, 2015 by Vertical Axion
You own a business and your business uses computers and the Internet. Do you regulate how your employees use their work computers? Should you? Can you? The answers to these questions are complicated, but they are vital to your business’s success; even a small business can lose over a thousand dollars a minute when its […]
July 6, 2015 by Vertical Axion
Many SMBs and corporations have shied away from allowing or using Android devices in the workplace because of possible security risks. Most of the security risks involved are related to the open development nature of the system, which allows hackers easier access to the OS and makes it easier for them to get their malware […]
July 4, 2015 by Vertical Axion
With the growing amount of data which every company generates today, most of which is being saved on computers, on servers and in the cloud, it’s no wonder you may be concerned about how to ensure that this valuable information is safe and secure. Hard copies are no longer something that companies care to print […]
July 3, 2015 by Vertical Axion
The potential for a system failure of a business’s digital storage system weighs heavily on many IT professionals. Your data storage system is vulnerable to a number of different disasters, ranging from physical destruction like floods and fires, to website hosting issues and employee mistakes or omissions. A loss of data can be a catastrophe […]
July 2, 2015 by Vertical Axion
There was a time when all your phone did was make calls, but it today’s world it is so much more. Smartphones let text, send email, surf the web, play games and even create documents. These small handheld computers have replaced our old, basic phones and have slowly woven themselves into almost every aspect of […]
June 29, 2015 by Vertical Axion
The cloud-related threats of 2013 are still around today. “The Notorious Nine; Cloud Computing Top Threats in 2013” was published by the Cloud Security Alliance (CSA) and is updated regularly, according to the CSA website. This document is touted as a way to assist companies in making risk management decisions about their cloud strategies. As […]
June 24, 2015 by Vertical Axion
The issue of data breaches is not limited to just the biggest companies. Those are the ones that draw the attention of the news media, but companies large and small have experienced data breaches varying in size from almost no significant customer exposure to the compromise of both customer and employee data. It is virtually […]
June 22, 2015 by Vertical Axion
In a business IT environment, the issue of software upgrades is far more important than for virtually every consumer. There are many reasons for this. One is simply the sheer number of computers that need to be upgraded, meaning that an upgrade error will affect hundreds or even thousands of users. Another is the impact […]
June 19, 2015 by Vertical Axion
Many small businesses have discovered the use of cloud computing, which refers to the use of off-site servers to store data, as opposed to just having it on your own computer’s hard drive or on your own network’s servers. Many of us were using the cloud before it was called that by creating online accounts […]
June 17, 2015 by Vertical Axion
It is no secret that hackers, the bad kind, seem to be everywhere. From local businesses trying to spy on their competitors to international peepers from anonymous foreign countries, every business and personal computer is under attack. In most cases, the goal is obtaining information for sale, whether it is to be sold on the […]
June 16, 2015 by Vertical Axion
It seems that no security company is safe from hackers as LastPass finds itself among the recent high profile hacks. If you’re not sure what LastPass is, it’s a secure password service. You generate a Master Password, and use it to securely store all your other passwords. It’s convenient, because it leaves you only having to […]
June 13, 2015 by Vertical Axion
It may come as a surprise to many, but the source of most small business data breaches – about 80 percent – come from employees who either violate protocol or misuse their access privileges and use company computers for personal use. More than one of the data breaches that have made the news involve an […]
June 12, 2015 by Vertical Axion
It’s no secret, in the Data Security vs. Hacker war, the hackers are winning. Every year, we see more and more data breaches occurring on an ever larger and grander scale. Every year, we hear about how companies are taking steps to better secure their data and the data their customers share with them, but […]
June 8, 2015 by Vertical Axion
BYOD, also known as Bring Your Own Device, is a growing trend in the modern business environment. It has been an issue as younger people, often referred to as digital natives, enter the workforce and bring with them years of experience with technology. Combined with the fact that the baby boomers are now leaving the […]
June 5, 2015 by Vertical Axion
One of the most often overlooked security holes in many companies is through third party providers. Companies may have a comprehensive security policy in place for their internal networks, with provisions for mobile devices and a great data loss prevention strategy, but may leave themselves wide open when it comes to the third party security. […]