6 common IT practices that should be eliminated
Here is a good mrc Cup of Joe Blog about time wasting tasks in IT. I was asked to submit a suggestion for the article. It is a quick read on six things you can do to stop wasting time [...]
Skip to content
Here is a good mrc Cup of Joe Blog about time wasting tasks in IT. I was asked to submit a suggestion for the article. It is a quick read on six things you can do to stop wasting time [...]
We are into the final preparations for Alvaka Networks third
annual track day. The date is getting
close on Friday November 8th, 2013.
This is a client appreciation day. We invite clients, prospects and numerous associated
businesses out to Auto Club Speedway for a private IT expo, lunch, fast driving
on the track and other fun activities.
The new malware uses SMTP to send the data it steals to the perpetrators. It appears the origin of this malware has its roots in China. It first appeared in August.It collects phone numbers, sent and received SMS messages and [...]
Is it better to insure than secure? Maybe not. You better dust off those old insurance policies that most of us look at all too infrequently. Schnucks has been notified by their insurance carrier that they don’t plan to cover them for the lawsuits.
The problem that likely exists with your current insurance policy is that they were designed and sold in a pre-Internet era. Data is not considered....
Creating successful targeted attacks requires attackers to learn about us. They will research our email addresses, our job, our professional interests, and even the conferences we attend and the websites we frequent. All of this information is compiled to launch a successful targeted attack. Once on our devices, the attacker’s tools are designed to pull as much data as possible. Undiscovered targeted attacks can collect years of our email, files, and contact information.
Are Your Network Endpoints Secure?
Whether or not you have an IT succession plan has more to do with the ethics and professional confidence of your IT management than anything else. It is true that some IT organizations are just too busy, but they should [...]
I am again reading another story about the NSA. This one is from ZDNet titled, Yahoo Reveals US Government Made 13,000 Requests for User Data. I am finding myself struggling with a solid opinion on the controversy over the NSA [...]
You may have heard of the revolution coming in the form of the personal 3D printer; a device that can print physical representation of almost any object you can imagine. Here is a link to more on 3D printers, http://en.wikipedia.org/wiki/3D_printing [...]
Dave Cunningham, our Business Technology Officer, has been doing some research on e-mail security and privacy for company executives. In doing that research, he came across an interesting article on a survey that points out that one in three IT [...]