by Tom | Sep 18, 2017 | Blog
Do you know what a botnet is and how it works? It’s basically a network of infected computers that can be used to perform Distributed Denial of Service attacks, overloading target networks and forcing them to endure downtime. They can also be used to distribute...
by Tom | Sep 15, 2017 | Blog
Have you had to make substantial technology investments in the past year? How much money do you think you will spend this year? If you have a solid technology budget in place, you’ll know how much you expect to spend, but what happens if critical systems fail?...
by Tom | Sep 11, 2017 | Blog
While computers, laptops, and tablets are incredible tools for productivity, there are many who miss the ability to scrawl out their ideas by hand. However, Microsoft has developed a means for your business to enjoy the benefits of both approaches with Windows Ink....
by Tom | Sep 8, 2017 | Blog
In 2016 former President of the United States Barack Obama passed the Cybersecurity National Action Plan that implemented near-term action and developed a longer-term strategy of bringing awareness and protections to public computing systems connected to the Internet....
by Tom | Sep 8, 2017 | Blog
In case you haven’t heard, the credit bureau, Equifax, has suffered a data breach that may have exposed the records of 143 million Americans. On July 29th, it was discovered that cybercriminals had “exploited a U.S. website application vulnerability to gain access to...