Call 980-407-5488
Blog
June 2, 2015 by Vertical Axion
Do you know what the first thing you would do if your business got hacked? Have you planned for this eventuality or even thought about it? While it’s not a very pleasant thing to contemplate, with the abundance of computer hacks happening every day, it’s not something you can afford to not think about. It […]
Read more »
Tagged
June 1, 2015 by Vertical Axion
Microsoft is ending support for Windows Server 2003 on July 14, 2015. Losing maintenance for Windows Server 2003 is a concern as Microsoft will not be providing critical maintenance patches to fix vulnerabilities being exploited by the hacking world. Microsoft is ending support in an effort to force users into a more modern operating system; […]
May 25, 2015 by Vertical Axion
Keeping our data safe and secure is a very serious matter, but there are a few things that can be done to keep precious information safe from external invasions as well as an unforeseen, internal malfunction. 1. Use some sort of a reactive software protection like anti-malware, which is just a basic requirement for all […]
May 23, 2015 by Vertical Axion
It’s not as though it’s a secret. More and more, companies are embracing the advantages of the cloud, both for data storage and for certain processing functions. There’s a good reason for that. Companies that do so are milking ever more efficiency out of their operations, and that helps add to the bottom line. Even […]
May 15, 2015 by Vertical Axion
Apple has added some intriguing features to their latest mobile product lineup, one of which is the fingerprint scanner. Its stated purpose is to heighten the security on the mobile phone. As the smartphone in general becomes increasingly integrated into the mobile office, making it harder to break in seems like a good idea. However, […]
May 13, 2015 by Vertical Axion
It’s convenient, it saves you and your company a few dollars over your personal or business mobile hot spots and it just pops up when you flip open your laptop or look at your tablet or smartphone. You may not even think twice before hopping on the Wi-Fi at your hotel, but perhaps you should […]
May 9, 2015 by Vertical Axion
In 2014 we saw numerous security breaches around the world. We saw the security compromised in such big names as Sony, Target, Goodwill Industries, Home Depot, JP Morgan and Michaels. For 2015, most security analysts are predicting an even greater increase in the number of security breaches and cyber-attacks. In the 2015 Cyber Threat Defense […]
May 7, 2015 by Vertical Axion
When you open the box on a new tablet, cell phone, netbook or laptop it is tempting simply to hit the start button and go. Unfortunately, doing that may be a big mistake, not because you need to read the instructional manual or pick out a waterproof case, but because there is a possibility that […]
May 6, 2015 by Vertical Axion
It is commonplace today to hear businesses voicing concerns about using cloud based services as though the cloud is much less secure than any system you might purchase or devise on site. In reality it is not the cloud or any other platform that determines how much of a security risk you are taking with […]
May 2, 2015 by Vertical Axion
Most experts in the data security field agree that a data breach is more likely than not to happen to almost every company. Far from being a death knell to the business that experiences it, a loss or compromise of data is quite survivable. The way you and your IT and other departments react to […]
May 1, 2015 by Vertical Axion
No new business today can operate without IT technology; the inconvenient truth is most new business owners are tyros when it comes to understanding how to integrate IT with their business’s operations. One area where knowledge is lacking and confusion reigns is that of protecting data from hackers. Today’s hackers are not the same as […]
April 29, 2015 by Vertical Axion
USB flash drives have been on the market for over a decade and are popular as a means of safely storing data in an effective, secure medium. As businesses increase their demand for flash drives, these drives are increasing their data storage and security capabilities exponentially. The great thing about flash storage devices is that […]
April 28, 2015 by Vertical Axion
The past few years have seen a growing number of high profile data breaches, costing the affected companies millions of dollars. Making it harder to recover from such a calamity is the loss of confidence the affected business experiences within its customer base. Most businesses have staff whose job it is to develop policies and […]
April 27, 2015 by Vertical Axion
With the rise of applications like Dropbox, OneDrive, Box, Google Drive, Apple iCloud, Spideroak and the like the question for many IT departments is not whether a business should move to the cloud, but when the transition should take place and with which provider. Interestingly, even though the cloud is talked about constantly in many […]
April 20, 2015 by Vertical Axion
Whether you are talking with Appleheads or Byteheads, the issue of the security of Apple’s operating systems has been a debate that has continued for decades. Many Apple computer users firmly state that their system has never been exposed to the plethora of virus and malware attacks Windows and other operating systems have become oddly […]
April 18, 2015 by Vertical Axion
Passwords everywhere, with every system, with every account you have. You forget your passwords, or they are weak passwords that are easily picked off. Your company’s IT department spends countless hours retrieving passwords. Now, with the upcoming release of Microsoft’s Windows 10, your IT department may have more time on its hands to handle more […]
April 17, 2015 by Vertical Axion
Ransomware is a type of malware that infects your computer and encrypts your data until you actually pay to have it removed. The first sign of trouble is usually some sort of text telling you that your computers data has been protected by a strong encryption and you will not be able to work with […]
April 16, 2015 by Vertical Axion
Distributed Denial of Service (DDoS) attacks have been around for a while, but since the turn of the millennia we have seen an increasing use of DDoS attacks that target large corporations, small businesses and even individual users. Firewalls and Intrusion Prevention Services (IPS) provide little to no protection against DDoS attacks and can leave […]
April 10, 2015 by Vertical Axion
Mobile phones play an ever-increasing role in the operations of businesses. Not just for communication any more, smartphones are used to access data; to record video, audio, and still images and play them back; to help with meeting agendas and travel schedules; and to find everything from your client’s jobsite to local restaurants while traveling. […]
April 8, 2015 by Vertical Axion
Disaster recovery plans have been around long before the creation of the cloud. Back in the days of early personal computing, paper was the main source of data storage that companies depended on to recover critical company information in the event of a disaster. The location of the stored data was usually in a physical […]
April 6, 2015 by Vertical Axion
With smartphones becoming more and more about data storage and access than just simply communication, businesses are finding that these “pocket computers” are proving to be not just handy, but vital, to their survival in a need-it-now world. But revelations that tech companies were sharing emails, text messages, and other information with the National Security Agency […]
April 2, 2015 by Vertical Axion
The idea of corporate management being delusional about the security of their networks seems almost laughable given the state of the recent successful cyberattacks against companies such as Home Depot, Target, and even Adobe. Yet the network giant Cisco reports that management believes that their networks are secure. Investigations into the security processes as major […]
March 31, 2015 by Vertical Axion
Many SMB’s and corporations have shied away from allowing or utilizing Android devices in the workplace, due to their possible security risks. Most of the security risks involved with Android are related to the open development nature of the system, which allows hackers easier access to the OS and makes it easier for them to […]
March 27, 2015 by Vertical Axion
Make no mistake about it. Adobe is an excellent company, and they’re very good about releasing patches, especially when security is at risk. Unfortunately, they’ve had to be. Adobe’s Flash technology has been the way in for a number of high profile hacking attacks that have revealed gaping holes in security and raised questions as […]