Ready for Disaster? Tips for Creating a Smart Business Continuity Plan

Ready for Disaster? Tips for Creating a Smart Business Continuity Plan

Mitigate Disaster with a Comprehensive Business Continuity Plan When you create a detailed business continuity plan, you can keep disaster from disrupting your operations. See how to get started here.   When disaster strikes, disruptions to your operations could negatively impact your construction projects, pushing them past the deadline and over budget. And it is…

Newly Discovered Security Flaws Put Windows Users at Serious Risk

Newly Discovered Security Flaws Put Windows Users at Serious Risk

Microsoft Vulnerability Affects Most Recent Operating Systems Learn about two recently discovered vulnerabilities that could put your company’s computers and operations at risk and what Microsoft is doing to fix the issue. Two newly discovered security vulnerabilities could put Windows users at risk of attack if they do not download and install security patches Microsoft…

The End Of Windows 7

The End Of Windows 7

As of January 14th, 2020, Microsoft will be ending all support for their hugely popular Windows 7 operating system, which has technology professionals strongly recommending businesses upgrade to Windows 10 in response. This brief video on the subject discusses what the end of Windows 7 support means for users and the risks that come with…

Capital One Data Breach Affects More Than 100 Million Customers

Capital One Data Breach Affects More Than 100 Million Customers

Capital One Data Breach Affects More Than 100 Million Customers and Small Businesses in The U.S. & 6 Million in Canada On July 29, 2019, Capital One reported that their customers’ confidential information was compromised. This includes the Social Security and bank account numbers of more than 100 million people and small businesses in the U.S.,…

New Phishing Threat Presents Security Challenge

New Phishing Threat Presents Security Challenge

Phishing Attacks Target OAuth Credentials to Gain System Access Discover how an increasingly popular authentication process, OAuth, can be exploited by hackers and wreak havoc on applications and access sensitive data. What Is OAuth? OAuth is a widely used framework that allows applications to share access to assets. It lets unrelated services and servers to…

What Is Network Segmentation?

What Is Network Segmentation?

What Is Network Segmentation? Businesses that offer WiFi to their customers or have sensitive data needs should consider network segmentation as a necessary component of their IT solution. With network segmentation, your wireless services are separated into different parts, allowing you to better control access and data flow. Network segmentation splits your wireless services into…