Traditionally for many decades computers utilized hard drives that physically moved. Round platters would store our information and read heads would move back and forth to access that information. When it came out, it was revolutionary. But like all good things, time moves on. In the last decade, we have been moving to a technology that does not physically move...

Read More

When you were younger, you’re taught that more is always better. So, if you have more layers of protection, you can defend your computers better. Right? The System Impact of Multiple Antivirus That is not exactly true when it comes to antivirus. The reason why is that we are encountering a lot of people that install multiple antivirus packages on their machines....

Read More

It’s been 6 weeks since the last global affecting ransomware attack has occurred. The last attack brought to you by WannaCry affected millions of computers and servers throughout the globe. That attack affected an ancient exploit going all the way back to Windows XP and was stolen from the national security agency. Hackers use that exploit and penetrated systems worldwide generating...

Read More

We have a client who absolutely must be online, ALL THE TIME. Are they a stock broker? A police station? Bank? Nope. Solar array farm. Yup, fields, and fields of solar panels. The Power Must Flow Why? Simple. The electric company doesn't tell them when they aren't generating power, and if there is no power being generated, the return on investment of the...

Read More

We had the fun privilege this week of doing a security check for a restaurant. We have agreements with banks, credit card processors and more to analyze a network for security issues or make changes to a client's network because of a new point of sale system to be installed or modifications to existing ones. The Restaurant's Network It was a...

Read More

In the last decade, we have seen something that is somewhat upsetting. Vendor network evaluations are not worth anything. Yup, we said it. From ISPs, printer providers, virtual server providers, email providers and others; all have failed to live up to their engineering personnel's recommendations. It's only after the disaster begins do we see what narrow scope they have been placed in with a...

Read More