Windows 7 End of Life is 15 Months Away
Microsoft held their annual conference in Orlando last week and one of the breakout sessions focused on ensuring that customers are on track to replace Windows 7 by January 14, 2020. Now is the time to…
Microsoft held their annual conference in Orlando last week and one of the breakout sessions focused on ensuring that customers are on track to replace Windows 7 by January 14, 2020. Now is the time to…
Doveryay, no proveryay is an old Russian proverb which Ronald Reagan used frequently when discussing relations with the Russians. It translates to “trust but verify” and was used to emphasize the extensive verification procedures both sides…
The SANS Institute is one of the most trusted resources for IT professionals and they provide many resources for free. Some of these resources include posters in their “Secure the Human” section that can be displayed…
Every couple of weeks, one of our client’s backup service would fail on one of their server and we would receive an alert. We would then manually restart the service, so their hourly backups could continue.…
I received a call from a childhood friend recently who stated that their AOL account had been compromised and that everyone in their contact received a spam email. I know many people who still have legacy…
We had a potential client approach us recently about performing a PCI compliance audit. They are a smaller operation that accepts credit cards, so their processor requires that they maintain compliance. A PCI audit is an…
You should have all passwords and be the registered owner for all things IT related. When we work with clients, we ensure that they're listed as the owner of the account, and we are merely technicians…
The issue with the old computer support models is that you end up paying too much for the services you receive. Traditional computer support depended on in-house staff, but our sourcing those services to a Managed…
When people discuss cloud-based services, they are referring to services ranging from hosted email such as Gmail and Office365 to hosted servers. But cloud-based services are often broken into groups to define the level of service…
I was at a location recently to connect a device and needed to connect to the Wi-Fi, so I was given a password and logged on successfully to their network. As I was working on the…