News and Articles from Equinox IT Services

TLS End of Life: What Is It & Will Your Business Be Affected?

November 15th, 2018 by admin

The largest web browsers have all announced that they will be ending support for applications that use old versions of TLS by 2020. You may not know what TLS is, but this change could affect your business. This is what you need to know, to be sure your infrastructure will still be supported.TLS is an...

Read Full Story »

Posted in: Protection, Security, Technology

What You Don't Know About VPNs

September 17th, 2018 by admin

Did you know if you run that VPN your IT guy set you up with, in China or Russia you could get a prison sentence? What about what a VPN actually protects you from? Most people have heard of the service, millions use them daily, few know what it really does. What is a VPN and what does it do? Virtual...

Read Full Story »

Posted in: Protection, Security, Products, Technology

Cyber Crime Has Gone Mobile: 7 Rules to Protect Your Phone

September 6th, 2018 by admin

It's hard to remember a world before smart phones. They are not only a means of communication, but our alarm clocks, calendars, flashlights, banks, and so much more. Not surprisingly, hackers have picked up on the trend; cyber crime has gone mobile. Over 60% of online fraud is done through mobile platforms...

Read Full Story »

Posted in: Protection, Security, Tech Tips, News, Technology

Tech Term of the Week: Encryption

August 6th, 2018 by admin

Whether you want to better understand how your personal devices work, what technologies can protect and enhance your business, or just want to learn a little bit more about tech to impress your friends—then we have the blog series for you! Each week, we’ll come at you with a term to expand your tech...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Technology

The Dangers of Public Wi-Fi: 10 Tips to Stay Protected

July 23rd, 2018 by admin

When you’re out and about, be it in your local coffee shop or the airport, a “Free Wifi” sign can be a welcome sight to see. But before you connect to that tempting public network, there are some important things to keep in mind about the potential risks involved. Although convenient, public wifi can...

Read Full Story »

Posted in: Protection, Security, Tech Tips

The Ethics of AI: Avoiding Science Fiction Disaster

May 1st, 2018 by admin

The future of Artificial Intelligence (AI) is incredible, yet frightening. The potential uses are limitless, and could lead to extremely helpful solutions. As the demand for AI increases and the technology advances, we are approaching a crossroads. Though the future is exciting, it comes along with some...

Read Full Story »

Posted in: Protection, News, Technology

Get Ahead of the Competition by Never Falling Behind: Why a Great Backup Solution is Critical

April 10th, 2018 by admin

Most people think of backups as a pass/fail situation. But the truth is, there’s a wide spectrum of quality when it comes to these critical solutions. You may have a passing-level solution, but do you and your company have A-grade backups? Here, we discuss some of the benefits and features that set the...

Read Full Story »

Posted in: Protection, Technology, Toolsets

Text Scams: The Long Lost Eleventh Plague of Egypt

March 15th, 2018 by admin

You’ve probably seen phishing scams before...you may have even forwarded a few. (It’s ok, this is a safe space.) We want to make sure you are aware of SMS phishing because it’s even more devious than regular phishing scams, it’s downright dastardly. But don’t worry, a little learning and you’ll have...

Read Full Story »

Posted in: Protection, Security, Tech Tips, News, Technology

The Future of Authentication and Security

March 5th, 2018 by admin

Since the beginning of time, there have been people trying to get access to and/or take things that don’t belong to them. A lock and key, a hiding spot with a map, or armed guards were the ways we used to make sure that only the intended individuals had access. Today we have passwords, fingerprints,...

Read Full Story »

Posted in: Protection, Security, Technology

After The Breach: What Happens to Stolen Data

March 2nd, 2018 by admin

Over the last few years, there have been many major data breaches including Target, Sony, and most recently, Equifax. Even if we don’t hear about them, smaller scale hacks are happening all the time. It’s terrifying to imagine our data getting into the wrong hands, but exactly whose hands is it getting...

Read Full Story »

Posted in: Protection, Security

BYOD & Workplace Security

February 15th, 2018 by admin

There has been a boom of BYOD workplaces in recent years. This means “bring your own device” not “bring your own drink” (or “bring your own drums” like I hoped it was). BYOD companies benefit by having lower employee startup costs, and the employees benefit from more freedom and power over their work....

Read Full Story »

Posted in: Protection, Security, Productivity, Technology

Hacking Your Dumb Smart Devices and Printers

February 8th, 2018 by admin

An infinite number of hackers, hacking an infinite number of printers, will eventually, accidentally print the complete works of Shakespeare. Why and how they ever hacked a printer in the first place, is the subject of the day. There are all kinds of devices that you use every day that you might not...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Technology

The Hitchhikers Guide to the Internet

February 5th, 2018 by admin

The internet is a pretty cool invention. We now have staggering power and potential at our fingertips. It’s a beautiful and eternal spectacle of cats dressed like people, and people dressed like cats. Memes about memes, thousand year old prophecies that were uploaded in 2009, entire web pages about ninjas...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Productivity, Technology

Chicken and Cyber Security: Lessons from 2017

January 31st, 2018 by admin

Reading about hacks is a great blend of macabre intrigue, and education by bad example. As terrible as cyber-attacks are, there is always wisdom to be gained from them (and as long as we’re learning, it might as well be fun!). With that in mind, we’ve got a lot of learning to catch up on from 2017. Some...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Case Studies

One Practice that will Save Your Company: End User Security Training

January 26th, 2018 by admin

One click of a button. One phone call. One suspicious email. It doesn’t take much for a hacker to get past your security defenses and into your business. All it takes for them to get inside is for someone at your company to let them in. You can see just how simple it can be in this video from CNN here....

Read Full Story »

Posted in: Protection, Security, Tech Tips, Case Studies, Products, Technology

A Technical Look at 2017: A Year in Review

January 22nd, 2018 by admin

2017 has been an exciting and astonishing year for technology around the world. The internet of things took major leaps and showed some of the drawbacks that come from connecting many new kinds of everyday items to the web. Artificial intelligence facial recognition software has been utilized to apprehend...

Read Full Story »

Posted in: Protection, Tech Tips, News

Your Source for Outsourcing Part 2: What to Outsource and What to Hold Onto

January 16th, 2018 by admin

Before you decide what to outsource and what to bring in-house, get some help analyzing a few critical areas: Your core technologies – Which areas are strong? Which are neglected? Your everyday users and VIP users – Do they need lots of help from IT? How patient do you expect them to be when their...

Read Full Story »

Posted in: Protection, Security, Meet Equinox, Productivity, Technology, Teams, Toolsets

Your Source for Outsourcing Part 1: When to Outsource Your IT

January 13th, 2018 by admin

We’ve seen a variety of solutions for business IT. Maybe you have a tech on payroll, maybe one of the guys from accounting (or whichever department) knows computers, maybe there is a neighborhood kid who owns a Gameboy and seemed to plug the printers in right when you asked them to (fingers crossed)....

Read Full Story »

Posted in: Protection, Productivity, Technology, Teams, Toolsets

Equifax Data Breach: The Largest Cyberattack In U.S. History

December 8th, 2017 by admin

On September 7th, Equifax announced it was the victim of what is now being called the largest cyberattack in U.S. history. For nearly three months (mid-May to July 2017) hackers were undetected while accessing hundreds of millions of Social Security numbers, names, and other personal information. The...

Read Full Story »

Posted in: Protection, Security, News

Shop Securely: Avoid Holiday Scams

November 20th, 2017 by admin

On the first day of Christmas, my scammer gave to me, three spoofed sites, two password loggers and a maaalware in a pear tree! The holidays are here and that means plenty of gift searching and online shopping. But before you begin your gift hunting, we have a few tips to keep all your presents in your...

Read Full Story »

Posted in: Protection, Security, Tech Tips, News

Three Unique Tips for Creating Memorable & Secure Passwords

November 6th, 2017 by admin

In today’s cyber-world, you can’t afford to have a password like “123456” (which, unfortunately, was the most common password of 2016). Many of us know deep down that our passwords could be more secure. We’ve heard it all before - they should be at least 12 characters long, avoid common words, use a...

Read Full Story »

Posted in: Protection, Security, Tech Tips

Three Ways to Keep Your IT from Turning into a Nightmare

October 23rd, 2017 by admin

This time of year, the scares are all fun and games until your power goes out, the backups fail, and you realize your situation is eerily similar to the start of a horror movie. Fortunately we are here to help you steer clear of IT Nightmares. (By IT we mean Information Technology, not creepy clowns...

Read Full Story »

Posted in: Protection, Tech Tips, Productivity

The Importance of Patching: The Best Offense is a Good Defense

October 18th, 2017 by admin

Ever had a pesky Windows pop-up ask you to update while you’re typing at 2000 WPM, keyboard smoking from the fury, and you can’t help but feel like it’s not your top priority? You’re not alone. Patches can be time consuming and can disturb workflow if not managed correctly, however, they have a huge...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Productivity

MFA Is Not a Swear Word: The Benefits of Multi-Factor Authentication

September 18th, 2017 by admin

There are some words considered too vulgar, heinous or dastardly to say in the workplace without causing a scene or bringing the judgement of your peers – “Multi-Factor Authentication” is quickly becoming three of them. As annoying as MFA can be, the truth is MFA can be your BFF and we can tell you why......

Read Full Story »

Posted in: Protection, Security, Tech Tips

Know Your Enemy: The Many Faces of Malware Explained

September 11th, 2017 by admin

It’s the end of the month, you’ve got deadlines to meet, customers to care for and patients to treat. You need everything functioning perfectly and that’s when your computer seems to be possessed with some kind of unmanageable, poltergeist situation that nobody has time for. If you’re lucky, you’ve got...

Read Full Story »

Posted in: Protection, Security, Tech Tips

Phishy Business: 8 Tips to Protect Your Company

August 24th, 2017 by admin

Phishing emails can seem impossible to avoid. Hackers have grown increasing more sophisticated and intricate in their abilities to disguise phishing emails but there are still a few signs that give them away. Here are eight things you should be aware of to prevent from getting “hooked” (as well as some...

Read Full Story »

Posted in: Protection, Security, Tech Tips

You Need a Vacation…And A VPN

August 10th, 2017 by admin

The bags are packed, the tickets are purchased, and you’re on your way to your dream vacation leaving work and worries behind. If that is your story go and enjoy it. If you are anything like the rest of us, then work often gets in the way of those dream vacations. VPN’s and Remote Access may provide...

Read Full Story »

Posted in: Protection, Security, Tech Tips

Warning: Just Another Multinational Cybersecurity Attack

June 29th, 2017 by admin

A month and a half ago, Wannacry Ransomware spread across more than 100 countries causing global distress. Now just 47 days later we are already facing another multinational attack. Cyberattacks are growing in both number and power. It’s more important than ever for businesses to be proactive when it...

Read Full Story »

Posted in: Protection, Security, Case Studies

If You Don’t Have a BDR Plan Today, You Might Not Have a Business Tomorrow.

June 13th, 2017 by admin

You have an insurance plan for your house, your car and your health. But what kind of insurance plan do you have to protect all the data your business relies on? Backups are the best proactive measure that your company can take to protect your data. But there is one thing more important than backups...

Read Full Story »

Posted in: Protection, Security, Tech Tips

How to Know If Your IT Provider is Doing a Good Job

June 8th, 2017 by admin

One of the most important IT practices that most people never think about is documenting their network. If something were to happen to your IT team would you know how to log onto your server or the passwords of all your employee’s workstations?  It’s important to not only know how to get into your network,...

Read Full Story »

Posted in: Protection, Tech Tips, Meet Equinox

Why is Patching so Important? WannaCry Virus Infects Over 100 Countries

June 8th, 2017 by admin

A world-wide ransomware attack swept across the globe last Friday infecting over 100 countries and leaving companies reeling. The virus attacked a vulnerability in Microsoft Windows. The patches for this weakness had been released by Microsoft months prior to the attack but due to out-of-date systems...

Read Full Story »

Posted in: Protection, Security, Tech Tips, Case Studies

Pop-Up Panic: The Tech Support Scam

June 8th, 2017 by admin

As an IT company we see a lot of viruses, scams, and other cyberattacks that businesses encounter. The Microsoft support pop-up scam is one of the easiest to recognize if you are prepared. The following article will tell you everything you need to know to be able to recognize, respond to, and protect...

Read Full Story »

Posted in: Protection, Security, Tech Tips

HIPAA Compliance Simplified: The How-To Guide for Healthcare Professionals

April 14th, 2017 by admin

The three main phases to reach HIPAA Compliance are (1) perform Annual Risk Assessments, (2) create a Policy Manual, and (3) Continue Improving. The Annual Risk Assessments help ensure that your clinic’s technology is secure and that the proper safeguards are in place. Your Policy Manual should blend...

Read Full Story »

Posted in: Protection, Security, Tech Tips

How to Make a Backup and Disaster Recovery Plan in Three Steps

February 8th, 2017 by admin

140,000 hard drives crash each week and 60% of companies that lose critical data are forced to shut down because they are unable to recover their information. Reliable backups should be every business' best friend. Unfortunately most companies don't realize the importance of actively managing their backups...

Read Full Story »

Posted in: Protection, Security, Tech Tips


Cal. Civ. Code § 1798.102 - Do Not Sell My Personal Information