Monthly Archives: October 2019

What does Windows 7 End of Life Mean for My Business?

You’ve all heard the panic. Windows is cutting off support for its widely popular version 7 software. January 14, 2020 will officially mark Windows 7 End of Life. Many companies have used Windows 7 since it launched in 2009 and are still actively using it today. So, what’s the big deal? Can you just stick with Windows 7 or will your computer self-destruct? The good news is that your computers will work just fine after the End of Life (EOL) date. However, just because your computer will function doesn’t mean it’s wise to hold onto outdated software. The largest concern for Windows 7 users is security. Since updates and support will no longer be available, your device will be extremely vulnerable to cyber threats. InRead Full Article


Cyber-Crime and Security for SMBs

Did you know the illicit trading of personal data was worth $3.88 billion last year? Cyber-crime is a growing industry known for its innovation. It goes far beyond the image many of us have of some hacker kid in his basement. Many who engage in this activity are professionals and work in large teams. Some may even be sponsored by governments. If you follow the news, you can find large corporations and even government agencies who have fallen prey to hackers and had massive amounts of data compromised. Unfortunately, this has led smaller firms to feel they fly below the radar. In fact, the opposite is true. Small businesses–especially those in regulated areas such as medical, financial, and legal services–need to be hyper vigilant aboutRead Full Article


Computer Hackers 101

Most people are aware of terms like phishing and malware, but do you know those are a part of a larger scheme called social engineering? This is not a new kind of fraud, in fact it’s been used for many years to manipulate a wide range of people into giving up important data about themselves or workplace. A prime example of social engineering goes back to Greek mythology with the Trojan horse. They infiltrated the city of Troy with a “peace offering” filled with soldiers, thus winning the war. With technology at the forefront of our lives, social engineering has entered a new era. Physical human interaction is not necessarily required anymore. Cyber-criminals, better known as computer hackers, can gain information through emails, pop-ups andRead Full Article


Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone who uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into. Viruses: These act very similar to the flu virus. Once it gets into a computer, it propagates by copying itself and becoming part of another program. Then just like the flu at an elementary school, it spreads from computer to computer. However, a virus must be activated, by opening orRead Full Article