We are in the peak of the Hurricane season here in the south east so it’s important that everyone is paying special attention to the technology equipment in our homes and businesses.
Hurricane Watch (36-24 hours prior to landfall)
During this period you should begin preparing all non-essential equipment and infrastructure including all PC’s, printers and monitors. All software manuals and technology should be stored away from windows and as far away from the floor as possible ideally in a sealed weatherproof container or safe. Run a final backup on all servers prior to shutting them down. Keep in mind – backups can take several hours to complete so [...]
Password guidelines supplied by NIST (The National Institute of Standards and Technology) have changed. The current password complexity rules require an uppercase character, lowercase character, numbers, and symbol that would need to be changed every 90 days. The issue with this guideline is that people have a hard time remembering these passwords and would write them down (Security violation because unwanted people could gain access to sensitive information) or incrementally change a number or character to essentially keep the password as close to the original as possible. This would cause a headache with many system administrators because of constant resetting of passwords [...]
Meet the “New Standard” for Business Email
Email has been around for over 40 years and in that time, it has gone from being a “useful tool” to being a critically important business application.
Although the underlying technology has remained stable and proven during this time, the ecosystem around email has changed significantly and dramatically. New and unavoidable vulnerabilities have come to the forefront, making it crucial to take a fresh approach at managing email.What’s Wrong With The “Old” Way?
When the first email protocol was developed back [...]
There are three levels of ransomware. Ransomware is a type of malicious software which is designed to block your access to your computer until you pay a specific amount of money.
1.) Scareware – These are lowest on the totem pole and include fake anti-virus and anti-malware clients detecting non-existant issues and demanding money for the program to fix it.
2.) Browser/Screen locking ransomware – Think of the FBI moneypack virus where they claim to have detected illegal activity on your computer and demand a “fine” to prevent further prosecution.
3.) Encrypting ransomware – This ransomware is the worst of the worst and encrypts all [...]
WiGig (802.11ad)is a wireless standard developed by the Wireless Gigabit Alliance and it’s designed to have significantly faster wireless network speeds. It will be available on consumer devices beginning this year. While it will not be replacing WiFi completely due to it’s extremely short range we will definitely see it in use for local networks replacing some of the network backbone. The earliest you’ll need to start worrying about WiGig will be the second half of 2017.
Ordinary WiFi is cheaper and more reliable for most of us but with the influx of wireless displays, VR headsets, phones and 4K video and TV’s our airwaves are getting crowded which is [...]
While Solid State Drives are definitely a worthwhile investment they are not fail-proof, and failing SSD’s are not that uncommon and it’s always important to have backups in place for any system that houses important files.
Solid State Drives have a limited number of writes before they fail so here are some tips to maximize the life of your SSD.
The hibernation feature can hurt your SSD. It’s recommended to put the computer to sleep or shutdown instead. Hibernation works by writing your current session to the hibernation file whenever the computer goes into that mode (increased number of writes to your SSD). You can disable [...]