Tech Resources & Articles

Helpful Hackers? Quick guide to Hacker Hat Colors

July 6th, 2022 by admin

A graphic with three hackers wearing different color hats infront of laptops, with the color of their hats specified above the: (from left to right) Black, Gray, White.

When you think of a hacker, you probably picture a malicious criminal using the internet to harm or steal your sensitive information. While this type of hacker certainly exists not all hackers fit this profile. Many hackers are not using their computer...

Learn More

Posted in: Protection, Security

Cybersecurity Awareness Month

October 27th, 2021 by admin

Computer Security depicted with a stylized graphic of people around a giant monitor, with imagery of locks, keys, and logins as a center focus

Malicious cyber actors pose a persistent and growing threat to our country. Companies from all industries (health, education, law enforcement, etc.) have all been hit by ransomware attacks, delaying crucial services and even can jeopardize national...

Learn More

Posted in: Protection, Security

Trick or Treat: Spotting the Difference Between Spoofed or Real Emails

October 25th, 2021 by admin

Closeup of hands typing on a laptop, with Halloween paraphernalia scattered around the laptop

A frightening three billion spoofing messages are sent daily, representing 1% of total email traffic. A spoofed email is a fake email that looks like it’s from a trusted source but isn’t. It typically includes links to malicious websites that can...

Learn More

Posted in: Protection, Security, Tech Tips

The Dark Web & Protecting Your Information

October 25th, 2021 by admin

A web containing multiple devices with cartoon-stylized silhouettes of people with a spider at the center representing the dark web

The Dark Web is an item of public fascination and horror. We hear about criminal activities, black markets, and rebellion taking place all around us in the same data streams we operate in, with complete and potentially impenetrable anonymity. The...

Learn More

Posted in: Protection, Security

Search Result Quackery: Does Google Bias Politics?

October 30th, 2020 by admin

Row of Rubber Ducks on Gray Background

One minute you are posting, for the first time in your life, about how nice it would be to have a microwave you could reach from the bathtub. The next you know, you’re seeing ads for a waterproof microwave, thinking, “how did they know?” And “is this...

Learn More

Posted in: Protection, Tech Tips

Four Tips to Safely Shop Online for the Holidays

October 30th, 2020 by Sarah E Ashley

Phone with 'Online Shopping' on Screen and Shopping Cart in Surgical Mask Filled with Delivery Boxes

76% of All United States Adults Shop Online This stat was taken from a 2019 survey. Imagine what that percentage will be in 2021. Shopping online safely is so important considering more and more people are turning away from brick-and-mortar shops to...

Learn More

Posted in: Protection, Tech Tips

Don't Get Tricked, Let's Fight Identity Theft

October 18th, 2020 by admin

Pumpkin next to laptop in a dark room.

Fall is here. The leaves are changing and each day brings a unique blend of colors, the air is aromatic, and dry... -Ack, COUGH- And for the next couple of months we get to enjoy the sweet smell of nature as it’s getting ready for what is shaping...

Learn More

Posted in: Protection, Security, Solutions

The Battle of Artificial Intelligence: Malware vs. Antivirus

October 9th, 2020 by admin

Small army figures on laptop.

Artificial Intelligence has revolutionized technology. Right now, most viruses utilized by hackers use artificial intelligence strategies to bypass computer’s defenses. This has created a need for security services and applications to use dynamic...

Learn More

Posted in: Protection, Security, News, Technology

TLS End of Life: What Is It & Will Your Business Be Affected?

November 15th, 2018 by admin

SSL Certificate

The largest web browsers have all announced that they will be ending support for applications that use old versions of TLS by 2020. You may not know what TLS is, but this change could affect your business. This is what you need to know, to be sure your...

Learn More

Posted in: Protection, Security, Technology

What You Don't Know About VPNs

September 17th, 2018 by admin

Mobile phone connecting securely through a VPN

Did you know if you run that VPN your IT guy set you up with, in China or Russia you could get a prison sentence? What about what a VPN actually protects you from? Most people have heard of the service, millions use them daily, few know what it really...

Learn More

Posted in: Protection, Security, Products, Technology

Cyber Crime Has Gone Mobile: 7 Rules to Protect Your Phone

September 6th, 2018 by admin

Man using a mobile phone in front of a cellular tower

It's hard to remember a world before smart phones. They are not only a means of communication, but our alarm clocks, calendars, flashlights, banks, and so much more. Not surprisingly, hackers have picked up on the trend; cyber crime has gone mobile....

Learn More

Posted in: Protection, Security, Tech Tips, News, Technology

Tech Term of the Week: Encryption

August 6th, 2018 by admin

Whether you want to better understand how your personal devices work, what technologies can protect and enhance your business, or just want to learn a little bit more about tech to impress your friends—then we have the blog series for you! Each week,...

Learn More

Posted in: Protection, Security, Tech Tips, Technology

The Dangers of Public Wi-Fi: 10 Tips to Stay Protected

July 23rd, 2018 by admin

When you’re out and about, be it in your local coffee shop or the airport, a “Free Wifi” sign can be a welcome sight to see. But before you connect to that tempting public network, there are some important things to keep in mind about the potential risks...

Learn More

Posted in: Protection, Security, Tech Tips

The Ethics of AI: Avoiding Science Fiction Disaster

May 1st, 2018 by admin

The future of Artificial Intelligence (AI) is incredible, yet frightening. The potential uses are limitless, and could lead to extremely helpful solutions. As the demand for AI increases and the technology advances, we are approaching a crossroads. Though...

Learn More

Posted in: Protection, News, Technology

Get Ahead of the Competition by Never Falling Behind: Why a Great Backup Solution is Critical

April 10th, 2018 by admin

Most people think of backups as a pass/fail situation. But the truth is, there’s a wide spectrum of quality when it comes to these critical solutions. You may have a passing-level solution, but do you and your company have A-grade backups? Here, we discuss...

Learn More

Posted in: Protection, Technology, Toolsets

Text Scams: The Long Lost Eleventh Plague of Egypt

March 15th, 2018 by admin

You’ve probably seen phishing scams before...you may have even forwarded a few. (It’s ok, this is a safe space.) We want to make sure you are aware of SMS phishing because it’s even more devious than regular phishing scams, it’s downright dastardly. But...

Learn More

Posted in: Protection, Security, Tech Tips, News, Technology

The Future of Authentication and Security

March 5th, 2018 by admin

Since the beginning of time, there have been people trying to get access to and/or take things that don’t belong to them. A lock and key, a hiding spot with a map, or armed guards were the ways we used to make sure that only the intended individuals had...

Learn More

Posted in: Protection, Security, Technology

After The Breach: What Happens to Stolen Data

March 2nd, 2018 by admin

Over the last few years, there have been many major data breaches including Target, Sony, and most recently, Equifax. Even if we don’t hear about them, smaller scale hacks are happening all the time. It’s terrifying to imagine our data getting into the...

Learn More

Posted in: Protection, Security

BYOD & Workplace Security

February 15th, 2018 by admin

There has been a boom of BYOD workplaces in recent years. This means “bring your own device” not “bring your own drink” (or “bring your own drums” like I hoped it was). BYOD companies benefit by having lower employee startup costs, and the employees benefit...

Learn More

Posted in: Protection, Security, Productivity, Technology

Hacking Your Dumb Smart Devices and Printers

February 8th, 2018 by admin

An infinite number of hackers, hacking an infinite number of printers, will eventually, accidentally print the complete works of Shakespeare. Why and how they ever hacked a printer in the first place, is the subject of the day. There are all kinds of...

Learn More

Posted in: Protection, Security, Tech Tips, Technology

The Hitchhikers Guide to the Internet

February 5th, 2018 by admin

The internet is a pretty cool invention. We now have staggering power and potential at our fingertips. It’s a beautiful and eternal spectacle of cats dressed like people, and people dressed like cats. Memes about memes, thousand year old prophecies that...

Learn More

Posted in: Protection, Security, Tech Tips, Productivity, Technology

Chicken and Cyber Security: Lessons from 2017

January 31st, 2018 by admin

Reading about hacks is a great blend of macabre intrigue, and education by bad example. As terrible as cyber-attacks are, there is always wisdom to be gained from them (and as long as we’re learning, it might as well be fun!). With that in mind, we’ve...

Learn More

Posted in: Protection, Security, Tech Tips, Case Studies

One Practice that will Save Your Company: End User Security Training

January 26th, 2018 by admin

One click of a button. One phone call. One suspicious email. It doesn’t take much for a hacker to get past your security defenses and into your business. All it takes for them to get inside is for someone at your company to let them in. You can see just...

Learn More

Posted in: Protection, Security, Tech Tips, Case Studies, Products, Technology

A Technical Look at 2017: A Year in Review

January 22nd, 2018 by admin

2017 has been an exciting and astonishing year for technology around the world. The internet of things took major leaps and showed some of the drawbacks that come from connecting many new kinds of everyday items to the web. Artificial intelligence facial...

Learn More

Posted in: Protection, Tech Tips, News

Your Source for Outsourcing Part 2: What to Outsource and What to Hold Onto

January 16th, 2018 by admin

Before you decide what to outsource and what to bring in-house, get some help analyzing a few critical areas: Your core technologies – Which areas are strong? Which are neglected? Your everyday users and VIP users – Do they need lots of help from...

Learn More

Posted in: Protection, Security, Meet Equinox, Productivity, Technology, Teams, Toolsets

Your Source for Outsourcing Part 1: When to Outsource Your IT

January 13th, 2018 by admin

We’ve seen a variety of solutions for business IT. Maybe you have a tech on payroll, maybe one of the guys from accounting (or whichever department) knows computers, maybe there is a neighborhood kid who owns a Gameboy and seemed to plug the printers...

Learn More

Posted in: Protection, Productivity, Technology, Teams, Toolsets

Equifax Data Breach: The Largest Cyberattack In U.S. History

December 8th, 2017 by admin

On September 7th, Equifax announced it was the victim of what is now being called the largest cyberattack in U.S. history. For nearly three months (mid-May to July 2017) hackers were undetected while accessing hundreds of millions of Social Security numbers,...

Learn More

Posted in: Protection, Security, News

Shop Securely: Avoid Holiday Scams

November 20th, 2017 by admin

On the first day of Christmas, my scammer gave to me, three spoofed sites, two password loggers and a maaalware in a pear tree! The holidays are here and that means plenty of gift searching and online shopping. But before you begin your gift hunting,...

Learn More

Posted in: Protection, Security, Tech Tips, News

Three Unique Tips for Creating Memorable & Secure Passwords

November 6th, 2017 by admin

In today’s cyber-world, you can’t afford to have a password like “123456” (which, unfortunately, was the most common password of 2016). Many of us know deep down that our passwords could be more secure. We’ve heard it all before - they should be at least...

Learn More

Posted in: Protection, Security, Tech Tips

Three Ways to Keep Your IT from Turning into a Nightmare

October 23rd, 2017 by admin

This time of year, the scares are all fun and games until your power goes out, the backups fail, and you realize your situation is eerily similar to the start of a horror movie. Fortunately we are here to help you steer clear of IT Nightmares. (By IT...

Learn More

Posted in: Protection, Tech Tips, Productivity

The Importance of Patching: The Best Offense is a Good Defense

October 18th, 2017 by admin

Ever had a pesky Windows pop-up ask you to update while you’re typing at 2000 WPM, keyboard smoking from the fury, and you can’t help but feel like it’s not your top priority? You’re not alone. Patches can be time consuming and can disturb workflow if...

Learn More

Posted in: Protection, Security, Tech Tips, Productivity

MFA Is Not a Swear Word: The Benefits of Multi-Factor Authentication

September 18th, 2017 by admin

There are some words considered too vulgar, heinous or dastardly to say in the workplace without causing a scene or bringing the judgement of your peers – “Multi-Factor Authentication” is quickly becoming three of them. As annoying as MFA can be, the...

Learn More

Posted in: Protection, Security, Tech Tips

Know Your Enemy: The Many Faces of Malware Explained

September 11th, 2017 by admin

It’s the end of the month, you’ve got deadlines to meet, customers to care for and patients to treat. You need everything functioning perfectly and that’s when your computer seems to be possessed with some kind of unmanageable, poltergeist situation that...

Learn More

Posted in: Protection, Security, Tech Tips

Phishy Business: 8 Tips to Protect Your Company

August 24th, 2017 by admin

Phishing emails can seem impossible to avoid. Hackers have grown increasing more sophisticated and intricate in their abilities to disguise phishing emails but there are still a few signs that give them away. Here are eight things you should be aware...

Learn More

Posted in: Protection, Security, Tech Tips

You Need a Vacation…And A VPN

August 10th, 2017 by admin

The bags are packed, the tickets are purchased, and you’re on your way to your dream vacation leaving work and worries behind. If that is your story go and enjoy it. If you are anything like the rest of us, then work often gets in the way of those dream...

Learn More

Posted in: Protection, Security, Tech Tips

Warning: Just Another Multinational Cybersecurity Attack

June 29th, 2017 by admin

A month and a half ago, Wannacry Ransomware spread across more than 100 countries causing global distress. Now just 47 days later we are already facing another multinational attack. Cyberattacks are growing in both number and power. It’s more important...

Learn More

Posted in: Protection, Security, Case Studies

If You Don’t Have a BDR Plan Today, You Might Not Have a Business Tomorrow.

June 13th, 2017 by admin

You have an insurance plan for your house, your car and your health. But what kind of insurance plan do you have to protect all the data your business relies on? Backups are the best proactive measure that your company can take to protect your data. But...

Learn More

Posted in: Protection, Security, Tech Tips

How to Know If Your IT Provider is Doing a Good Job

June 8th, 2017 by admin

One of the most important IT practices that most people never think about is documenting their network. If something were to happen to your IT team would you know how to log onto your server or the passwords of all your employee’s workstations?  It’s...

Learn More

Posted in: Protection, Tech Tips, Meet Equinox

Why is Patching so Important? WannaCry Virus Infects Over 100 Countries

June 8th, 2017 by admin

A world-wide ransomware attack swept across the globe last Friday infecting over 100 countries and leaving companies reeling. The virus attacked a vulnerability in Microsoft Windows. The patches for this weakness had been released by Microsoft months...

Learn More

Posted in: Protection, Security, Tech Tips, Case Studies

Pop-Up Panic: The Tech Support Scam

June 8th, 2017 by admin

As an IT company we see a lot of viruses, scams, and other cyberattacks that businesses encounter. The Microsoft support pop-up scam is one of the easiest to recognize if you are prepared. The following article will tell you everything you need to know...

Learn More

Posted in: Protection, Security, Tech Tips

HIPAA Compliance Simplified: The How-To-Guide for Healthcare Professionals

April 14th, 2017 by admin

The three main phases to reach HIPAA Compliance are (1) perform Annual Risk Assessments, (2) create a Policy Manual, and (3) Continue Improving. The Annual Risk Assessments help ensure that your clinic’s technology is secure and that the proper safeguards...

Learn More

Posted in: Protection, Security, Tech Tips

How to Make a Backup and Disaster Recovery Plan in Three Steps

February 8th, 2017 by admin

140,000 hard drives crash each week and 60% of companies that lose critical data are forced to shut down because they are unable to recover their information. Reliable backups should be every business' best friend. Unfortunately most companies don't realize...

Learn More

Posted in: Protection, Security, Tech Tips