News of a big brand suffering a data breach is all too common today. But if you don’t get an email from such a company, you could mistakenly be thinking it doesn’t affect you. The thing is, large breaches are happening all the time. Cybercriminals then put access credentials online, and other bad actors buy and exploit those email addresses,...
IT Consulting
Fifteen years ago smart technology in our homes meant we had a computer and maybe a smartphone. Now, we have speakers that talk to us, lights that anticipate our arrival, and doorbells that display video of our visitors, as well as the computers, tablets, phones, earphones, video game consoles, and more. It’s all cool, but it’s also complicated. In 2020...
Cybersecurity attacks on big-name brands or governments are familiar headlines these days. Millions of access credentials are breached, and millions of dollars are lost to ransomware attack. You may think you’re protected, but a single undetected misconfiguration could mean trouble. If you’ve been paying attention, you know no one is immune from cyberattack. Your business has been proactive by: putting...
When you sign up for an internet service, the provider will hook you up with an email address, too. Your internet service provider (ISP) wants to keep you connected to them. But this convenient email address isn’t always the best long-term solution for you. That “[email protected]" email address may work fine. You use it to keep in touch with...
The Rolling Stones sang, “Hey you, get off my cloud,” yet businesses might want to think instead about leaving the public cloud. Weigh these possible public cloud concerns against the advantages of alternate cloud solutions. When most people think of the cloud, they are thinking of the public cloud. Apple users are on its iCloud. Others may be storing files on Dropbox,...