I am asked on a daily basis, “How do we protect our company from ransomware?” A lot of you know of, or have friends that have been infected with Ransomware and were not prepared. They have paid ransom and have, in cases, lost all of their data. Ransomware is such a scary topic to many,…

Read More

Microsoft is changing the way you Office. In the past, Microsoft sold you a CD with the Microsoft Office software on it and allowed you to install it on up to 3 computers/devices. They are now moving to a “monthly service plan” or “subscription” style for Office (and presumably this is just the beginning of…

Read More

The latest rage in internet games is here and it’s name is Pokemon Go. You have by now at least heard of the game but how can your business profit from it? There are several ways; Use a Lure Module; You can purchase a Pokemon Lure Module for a little over a $1 per hour.…

Read More

Watch out for Keysniffer! There is a new security threat whereby a Hacker could get your passwords answers to your security questions and other private information. Keysniffer simply grabs whatever you are typing on your keyboard and sends it to the hacker. The good news is the hacker must be within 250ft of you to…

Read More

Microsoft is changing the way you Office. In the past Microsoft sold you a CD with the Microsoft Office software on it and allowed you to install it on up to 3 computers/devices. They are now moving to a “monthly service plan” or “subscription” style for Office (and presumably this is just the beginning of…

Read More
Hackers and Devices

Fill in the blank with any of today’s technology, phones, tablets even Smart TV’s! Hackers are everywhere these days, so the answer is yes. The protection of your devices may not seem crucial until something happens. Hackers are using more and more resources to get to your personal information, so ask yourself a couple of…

Read More
Tucson's I.T. firm supporting Compliance and Security. Ransomware specialist.

Ransomware such as Cryptolocker has made a lot of headlines in recent months mainly because it can cost you dearly. But also because it has affected a large number of people. Most of us know someone or have heard of companies that have had to deal with this type of situation. And it can be…

Read More

Once again there has been a list of passwords you should avoid using, a company known as SplashData releases this list every year. This list is comprised of passwords that were compromised over the past year. Password security is a vital part of protecting yourself from hackers, if you are using a password on this…

Read More

The definition of a Data Breach, as given by the Department of Health and Human Services (HHS.gov) is; “An incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so.” With 120 Million patient records compromised in 2015, more than 90% of healthcare organizations,…

Read More

There is lots of options for business when it comes to phone systems. Here are some things to consider before purchasing or switching to a VOIP system. Is VOIP reliable? VOIP, from most providers these days, is very stable, much better than just a few short years ago, Systems and softwares have been vastly improved…

Read More