July 6th, 2022 by admin
When you think of a hacker, you probably picture a malicious criminal using the internet to harm or steal your sensitive information. While this type of hacker certainly exists not all hackers fit this profile. Many hackers are not using their computer...
Learn More
Tags: cybersecurity, malware, security
Posted in: Protection, Security
October 27th, 2021 by admin
Malicious cyber actors pose a persistent and growing threat to our country. Companies from all industries (health, education, law enforcement, etc.) have all been hit by ransomware attacks, delaying crucial services and even can jeopardize national...
Learn More
Tags: cybersecurity, information, malware, ransomware, spyware
Posted in: Protection, Security
October 25th, 2021 by admin
A frightening three billion spoofing messages are sent daily, representing 1% of total email traffic. A spoofed email is a fake email that looks like it’s from a trusted source but isn’t. It typically includes links to malicious websites that can...
Learn More
Tags: Communications, cybersecurity, email, malware
Posted in: Protection, Security, Tech Tips
October 25th, 2021 by admin
The Dark Web is an item of public fascination and horror. We hear about criminal activities, black markets, and rebellion taking place all around us in the same data streams we operate in, with complete and potentially impenetrable anonymity.
The...
Learn More
Tags: cybersecurity, dark web, identity theft, password, security
Posted in: Protection, Security
October 30th, 2020 by admin
One minute you are posting, for the first time in your life, about how nice it would be to
have a microwave you could reach from the bathtub. The next you know, you’re seeing ads for
a waterproof microwave, thinking, “how did they know?” And “is this...
Learn More
Tags: network, security, sensitive information
Posted in: Protection, Tech Tips
October 30th, 2020 by Sarah E Ashley
76% of All United States Adults Shop Online
This stat was taken from a 2019 survey. Imagine what that percentage will be in 2021. Shopping online
safely is so important considering more and more people are turning away from brick-and-mortar shops
to...
Learn More
Tags: security, sensitive information
Posted in: Protection, Tech Tips
October 18th, 2020 by admin
Fall is here. The leaves are changing and each day brings a unique blend of colors, the air is aromatic, and dry... -Ack, COUGH- And for the next couple of months we get to enjoy the sweet smell of nature as it’s getting ready for what is shaping...
Learn More
Tags: Avast, Halloween, identity theft, password, security, sensitive information, SSL
Posted in: Protection, Security, Solutions
October 9th, 2020 by admin
Artificial Intelligence has revolutionized technology. Right now, most viruses utilized by hackers use artificial intelligence strategies to bypass computer’s defenses. This has created a need for security services and applications to use dynamic...
Learn More
Tags: AI, antivirus, artificial intelligence, Cylance, malware, network, ransomware, security, Solutions, spyware, trojans
Posted in: Protection, Security, News, Technology
November 15th, 2018 by admin
The largest web browsers have all announced that they will be ending support for applications that use old versions of TLS by 2020. You may not know what TLS is, but this change could affect your business. This is what you need to know, to be sure your...
Learn More
Posted in: Protection, Security, Technology
September 17th, 2018 by admin
Did you know if you run that VPN your IT guy set you up with, in China or Russia you could get a prison sentence? What about what a VPN actually protects you from? Most people have heard of the service, millions use them daily, few know what it really...
Learn More
Posted in: Protection, Security, Products, Technology
September 6th, 2018 by admin
It's hard to remember a world before smart phones. They are not only a means of communication, but our alarm clocks, calendars, flashlights, banks, and so much more. Not surprisingly, hackers have picked up on the trend; cyber crime has gone mobile....
Learn More
Posted in: Protection, Security, Tech Tips, News, Technology
August 6th, 2018 by admin
Whether you want to better understand how your personal devices work, what technologies can protect and enhance your business, or just want to learn a little bit more about tech to impress your friends—then we have the blog series for you! Each week,...
Learn More
Posted in: Protection, Security, Tech Tips, Technology
July 23rd, 2018 by admin
When you’re out and about, be it in your local coffee shop or the airport, a “Free Wifi” sign can be a welcome sight to see. But before you connect to that tempting public network, there are some important things to keep in mind about the potential risks...
Learn More
Posted in: Protection, Security, Tech Tips
May 1st, 2018 by admin
The future of Artificial Intelligence (AI) is incredible, yet frightening. The potential uses are limitless, and could lead to extremely helpful solutions. As the demand for AI increases and the technology advances, we are approaching a crossroads. Though...
Learn More
Posted in: Protection, News, Technology
April 10th, 2018 by admin
Most people think of backups as a pass/fail situation. But the truth is, there’s a wide spectrum of quality when it comes to these critical solutions. You may have a passing-level solution, but do you and your company have A-grade backups? Here, we discuss...
Learn More
Posted in: Protection, Technology, Toolsets
March 15th, 2018 by admin
You’ve probably seen phishing scams before...you may have even forwarded a few. (It’s ok, this is a safe space.) We want to make sure you are aware of SMS phishing because it’s even more devious than regular phishing scams, it’s downright dastardly. But...
Learn More
Posted in: Protection, Security, Tech Tips, News, Technology
March 5th, 2018 by admin
Since the beginning of time, there have been people trying to get access to and/or take things that don’t belong to them. A lock and key, a hiding spot with a map, or armed guards were the ways we used to make sure that only the intended individuals had...
Learn More
Posted in: Protection, Security, Technology
March 2nd, 2018 by admin
Over the last few years, there have been many major data breaches including Target, Sony, and most recently, Equifax. Even if we don’t hear about them, smaller scale hacks are happening all the time. It’s terrifying to imagine our data getting into the...
Learn More
Posted in: Protection, Security
February 15th, 2018 by admin
There has been a boom of BYOD workplaces in recent years. This means “bring your own device” not “bring your own drink” (or “bring your own drums” like I hoped it was). BYOD companies benefit by having lower employee startup costs, and the employees benefit...
Learn More
Posted in: Protection, Security, Productivity, Technology
February 8th, 2018 by admin
An infinite number of hackers, hacking an infinite number of printers, will eventually, accidentally print the complete works of Shakespeare. Why and how they ever hacked a printer in the first place, is the subject of the day. There are all kinds of...
Learn More
Posted in: Protection, Security, Tech Tips, Technology
February 5th, 2018 by admin
The internet is a pretty cool invention. We now have staggering power and potential at our fingertips. It’s a beautiful and eternal spectacle of cats dressed like people, and people dressed like cats. Memes about memes, thousand year old prophecies that...
Learn More
Posted in: Protection, Security, Tech Tips, Productivity, Technology
January 31st, 2018 by admin
Reading about hacks is a great blend of macabre intrigue, and education by bad example. As terrible as cyber-attacks are, there is always wisdom to be gained from them (and as long as we’re learning, it might as well be fun!). With that in mind, we’ve...
Learn More
Posted in: Protection, Security, Tech Tips, Case Studies
January 26th, 2018 by admin
One click of a button. One phone call. One suspicious email. It doesn’t take much for a hacker to get past your security defenses and into your business. All it takes for them to get inside is for someone at your company to let them in. You can see just...
Learn More
Posted in: Protection, Security, Tech Tips, Case Studies, Products, Technology
January 22nd, 2018 by admin
2017 has been an exciting and astonishing year for technology around the world. The internet of things took major leaps and showed some of the drawbacks that come from connecting many new kinds of everyday items to the web. Artificial intelligence facial...
Learn More
Posted in: Protection, Tech Tips, News
January 16th, 2018 by admin
Before you decide what to outsource and what to bring in-house, get some help analyzing a few critical areas:
Your core technologies – Which areas are strong? Which are neglected?
Your everyday users and VIP users – Do they need lots of help from...
Learn More
Posted in: Protection, Security, Meet Equinox, Productivity, Technology, Teams, Toolsets
January 13th, 2018 by admin
We’ve seen a variety of solutions for business IT. Maybe you have a tech on payroll, maybe one of the guys from accounting (or whichever department) knows computers, maybe there is a neighborhood kid who owns a Gameboy and seemed to plug the printers...
Learn More
Posted in: Protection, Productivity, Technology, Teams, Toolsets
December 8th, 2017 by admin
On September 7th, Equifax announced it was the victim of what is now being called the largest cyberattack in U.S. history. For nearly three months (mid-May to July 2017) hackers were undetected while accessing hundreds of millions of Social Security numbers,...
Learn More
Posted in: Protection, Security, News
November 20th, 2017 by admin
On the first day of Christmas, my scammer gave to me, three spoofed sites, two password loggers and a maaalware in a pear tree! The holidays are here and that means plenty of gift searching and online shopping. But before you begin your gift hunting,...
Learn More
Posted in: Protection, Security, Tech Tips, News
November 6th, 2017 by admin
In today’s cyber-world, you can’t afford to have a password like “123456” (which, unfortunately, was the most common password of 2016). Many of us know deep down that our passwords could be more secure. We’ve heard it all before - they should be at least...
Learn More
Posted in: Protection, Security, Tech Tips
October 23rd, 2017 by admin
This time of year, the scares are all fun and games until your power goes out, the backups fail, and you realize your situation is eerily similar to the start of a horror movie. Fortunately we are here to help you steer clear of IT Nightmares. (By IT...
Learn More
Posted in: Protection, Tech Tips, Productivity
October 18th, 2017 by admin
Ever had a pesky Windows pop-up ask you to update while you’re typing at 2000 WPM, keyboard smoking from the fury, and you can’t help but feel like it’s not your top priority? You’re not alone. Patches can be time consuming and can disturb workflow if...
Learn More
Posted in: Protection, Security, Tech Tips, Productivity
September 18th, 2017 by admin
There are some words considered too vulgar, heinous or dastardly to say in the workplace without causing a scene or bringing the judgement of your peers – “Multi-Factor Authentication” is quickly becoming three of them. As annoying as MFA can be, the...
Learn More
Posted in: Protection, Security, Tech Tips
September 11th, 2017 by admin
It’s the end of the month, you’ve got deadlines to meet, customers to care for and patients to treat. You need everything functioning perfectly and that’s when your computer seems to be possessed with some kind of unmanageable, poltergeist situation that...
Learn More
Posted in: Protection, Security, Tech Tips
August 24th, 2017 by admin
Phishing emails can seem impossible to avoid. Hackers have grown increasing more sophisticated and intricate in their abilities to disguise phishing emails but there are still a few signs that give them away. Here are eight things you should be aware...
Learn More
Posted in: Protection, Security, Tech Tips
August 10th, 2017 by admin
The bags are packed, the tickets are purchased, and you’re on your way to your dream vacation leaving work and worries behind. If that is your story go and enjoy it. If you are anything like the rest of us, then work often gets in the way of those dream...
Learn More
Posted in: Protection, Security, Tech Tips
June 29th, 2017 by admin
A month and a half ago, Wannacry Ransomware spread across more than 100 countries causing global distress. Now just 47 days later we are already facing another multinational attack. Cyberattacks are growing in both number and power. It’s more important...
Learn More
Posted in: Protection, Security, Case Studies
June 13th, 2017 by admin
You have an insurance plan for your house, your car and your health. But what kind of insurance plan do you have to protect all the data your business relies on? Backups are the best proactive measure that your company can take to protect your data. But...
Learn More
Posted in: Protection, Security, Tech Tips
June 8th, 2017 by admin
One of the most important IT practices that most people never think about is documenting their network. If something were to happen to your IT team would you know how to log onto your server or the passwords of all your employee’s workstations? It’s...
Learn More
Posted in: Protection, Tech Tips, Meet Equinox
June 8th, 2017 by admin
A world-wide ransomware attack swept across the globe last Friday infecting over 100 countries and leaving companies reeling. The virus attacked a vulnerability in Microsoft Windows. The patches for this weakness had been released by Microsoft months...
Learn More
Posted in: Protection, Security, Tech Tips, Case Studies
June 8th, 2017 by admin
As an IT company we see a lot of viruses, scams, and other cyberattacks that businesses encounter. The Microsoft support pop-up scam is one of the easiest to recognize if you are prepared. The following article will tell you everything you need to know...
Learn More
Posted in: Protection, Security, Tech Tips
April 14th, 2017 by admin
The three main phases to reach HIPAA Compliance are (1) perform Annual Risk Assessments, (2) create a Policy Manual, and (3) Continue Improving. The Annual Risk Assessments help ensure that your clinic’s technology is secure and that the proper safeguards...
Learn More
Posted in: Protection, Security, Tech Tips
February 8th, 2017 by admin
140,000 hard drives crash each week and 60% of companies that lose critical data are forced to shut down because they are unable to recover their information. Reliable backups should be every business' best friend. Unfortunately most companies don't realize...
Learn More
Posted in: Protection, Security, Tech Tips