Contact Us: 888-387-6851

Blog

Get up to speed on today’s hot-button IT issues!

Check out our blog entries for up-to the minute information and advice regarding some of the most urgent topics we’ve covered.

password guidelines

Don’t Take a Pass on Secure Password Guidelines

Today almost everything you do—and almost all information about you—is on a computer or a website connected to the internet. And nearly all businesses, from your doctor’s office to your mechanic, rely on computers and digital information to serve you and their other clients. So protecting this sensitive information with solid password guidelines should be…

Reviving a Network Ravaged by Ransomware: A Case Study

With ransomware on the rise, it’s critical to have an experienced, knowledgeable provider that keeps up with the latest on this ever-increasing threat. Check out this recent case study to see how James Moore’s Technology Solutions Consulting Team is in your corner in the fight against ransomware. A large company was hit with a severe…
ransomware damage

Five Ways to Mitigate Ransomware Damage

Lost files, denied access, ransom payments in the $100,000 range or higher… With the impact that hackers can have on your network and your business, we have always stressed the importance of a solid ransomware protection plan. By anticipating these attacks, you can prevent serious damage to your company’s financial picture and trustworthy reputation. However,…
technology budget

Leverage Your Technology Budget Surplus

As the end of the fiscal year approaches for many businesses and organizations, managers often comb through their budgets in search of unused funds. Your technology budget should no exception. Electronic equipment and IT network needs can easily be neglected until something forces you to spend money on them—for example, waiting until a computer fails…

Important Information Regarding Hurricane Dorian

Hurricane Dorian is expected to skirt the east coast of Florida on Wednesday, September 4 as a major Category 3 hurricane. From there, the storm is predicted to travel north along the eastern seaboard of the United States. James Moore’s TSC team is closely monitoring this storm and will continue to verify data backups for…
storm

Are You Prepared? A Storm Prep Checklist to Protect Your Network

While we’re halfway through a (thankfully) quiet Atlantic hurricane season, that’s no reason to let your guard down. Not only are we approaching the peak of the season, there are countless other natural disasters that can harm your business’s IT network at any time of the year. Ideally, of course, you would have completed your…
data recovery

Fast, Pain-Free Data Recovery: Do You Have the Right Elements in Place?

There are three critical elements you must have in place to quickly recover your data and IT system in the event of disaster. Yet did you know that most businesses don’t even have one of them? A natural disaster, server crash, ransomware attack or other data-erasing event can mean catastrophe for your business. So when…
cloud computing

Cloud Computing: The Good, The Bad & The Ugly

Cloud computing has great advantages, but its vulnerabilities can affect even the biggest tech names. When a network of internet of things (IoT) gadgets like routers, DVR machines and closed-circuit TVs can take down hardened, well-provisioned internet giants like Twitter, Spotify and Amazon—as happened October 2016—you’ve got to think twice before moving your data to…
hurricane planning for your tech

Protect Your Tech! Start Your Hurricane Preparation Now

Many businesses were impacted by the hurricanes of recent years, from Harvey and Irma in 2017 to Florence and Michael in 2018. Those that ultimately recovered had one thing in common—they were prepared ahead of time. While we can’t prevent or anticipate all disasters or threats to our businesses, hurricane preparation plays a huge role…
email

4 Emails You Should NEVER Open

No matter how “bomb-proof” we make your network, you and your employees can still invite a hacker in if you click on a link or open an attachment in an email sent by a cybercriminal. While some spam is obvious (can you say, “Viagra at a discount”?), others are very cleverly designed to sneak past…
electricity

The 4 Hidden Dangers of Electricity on Your IT Network

Is your computer plugged in? Do you use a power strip with a surge protector? If so, you are a heartbeat away from disaster and don’t even realize it. Believe it or not, the same electricity you depend on to run your computer and network is also one of the biggest threats to your equipment,…
cloud solutions

4 Must-Have, Low-Risk Cloud Solutions

Let’s face it—your business has more competition than ever. And they’ll eat you alive if you fall behind in today’s technology arms race. Maybe your network needs greater security. Or you haven’t yet taken advantage of new cloud-based apps that help your team get more done in less time. Today, the action is in the…

10 Warning Signs of Impending Computer Disaster… And How to Prevent Them

The old saying that “an ounce of prevention is worth a pound of cure” is especially true in the world of technology. Computers rarely stop working overnight; in most cases, there are early warning signs that problems are brewing. These 10 red flags are surefire warning signs that you need a professional to investigate your…

Think Your Business is Too Small to be Hacked? Think Again.

Despite high-profile digital security breaches showing up in the news nearly every week, most people assume they’re safe from attack. The thinking goes that while Fortune 500 corporations like J.P. Morgan, Sony, Tesco Bank and Target have lost millions of dollars in data breaches in recent years, my business is far too small to justify…
Man in black hooded sweatshirt with mask hacking a computer

Tax Season = Phishing Season

As you prepare your 2017 tax return, you’ll likely use email to send personal information to your accountants or other financial professionals. But as you sort through your inbox, can you tell the difference between a legitimate email and a scam? With tax season right around the corner, we generally see an increase in reports…
man in grey hoodie sitting in darkness on the computer

4 Things You Must Do To Protect Your Organization From Identity Theft

While it’s impossible to plan for every potential scenario, a little proactive planning and proper network precautions will help you avoid or greatly reduce the impact of the vast majority of cyber identity theft you could experience. Make Sure Your Backups Are Encrypted It just amazes me how many organizations don’t have the security of…
man in grey suit facing white hologram chart

You’re Ready for Irma… But What About Your IT Network?

You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps you should take NOW to minimize possible downtime due to storm damage. Check your data backup system to make sure it’s working. Do a test…
man holding lock icon

10 Biggest Myths of HIPAA Risk Assessments

We’ve heard the stories about electronic protected health information (ePHI) being misused or released to the public. But did you know that mere lack of protection itself can put you in violation of the Health Insurance Portability and Accountability Act (HIPAA)? In 2013, Idaho State University agreed to pay $400,000 to the U.S. Department of…
ransomware skull key icon

Ransomware: Education is Your Best Defense

You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT PAYMENT OR YOUR FILES WILL BE DESTROYED. You’ve been working on a project for two days. But when you frantically search for your files, they’re…
blue hallway with icons on walls and man in suit at the end

BrickerBot: Putting Security and Convenience at Risk

Technology makes it easier than ever to monitor your business when you’re not around. You can view live video feeds from surveillance cameras, set your building’s internal temperature, even turn off the lights when the closing crew forgets. It also makes your business more vulnerable to a web-based attack. And the newest threat targeting that…
blue backup key on computer keyboard

Demand the Best from Your Remote Backup Service

Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important function? If your data is important enough to back it up to a secure off-site facility, you shouldn’t trust that job to just anyone. Here…
magnifying glass on red broken lock

The Yahoo Data Breach: Are You At Risk?

It has recently been discovered that the Yahoo network was compromised back in 2014, resulting in the breach of over 500 million user accounts. If you have a have a Yahoo account, you should consider yourself at risk and take action immediately. The first concern is the ability of the thieves to use Yahoo passwords…
fingers clicking on white lock icon

Facebook Privacy Considerations

Facebook’s algorithms to suggest friendships often bring to light convoluted yet amusing coincidences. You might see an acquaintance from high school reach out to a colleague at your workplace, or perhaps a long-lost love knows a fellow daycare parent. But these algorithms can also have a troubling side if your profession requires client confidentiality, as…
woman holding tablet with icons coming out of it

Will Your Backups Be There When You Need Them?

When the livelihood of your organization depends on data stored in your computer network, you simply cannot afford to leave anything to chance. Data preservation and the ability to retrieve it at any point in time is the foundation of business continuity. Yet the facts about backup failures are shocking: According to the Boston Computing…
purple coding and technology icon

Web Content Filtering, Your Luckiest Move of the Year

Do your employees bring their own smartphones, tablets or laptops to work? If your company is like most these days, they do. And that raises a whole new security risk to your computer network. One of the best strategies your company can employ to defend against this emerging threat is what’s known as “web content…
woman holding technology keywords

Technology Quick Fixes to Help Improve Your Business’ Productivity

Thank you for joining me for the second part of our technology business planning series.  Last month we focused on the user experience and how planning to upgrade those components increases user productivity, lowers costs, and supports a healthy and happy workplace environment. Read the previous article, “5 Simple Technology Solutions to Help Ensure Your Workplace…
knob switching from problems to solutions

5 Simple Technology Solutions to Help Ensure Your Workplace Gets the Biggest Bang for its Buck

We know that technology should help us perform more efficiently. But, how often do you wait until a hardware or software failure forces you to reevaluate the right tools for you and your business? Do you know the financial and well-being repercussions of waiting until it’s too late? Consider implementing the following five technology solutions now…
gold lock on computer keyboard

Security Best Practices Check-List

Do You Have the Right Technology to Maintain Privacy & Minimize Data Breaches? Do you collect and maintain sensitive information (e.g. name, address, DOB, SSN, credit card or bank account information, private health information)? Do you want to minimize your risk of data breaches? Not sure where to start? With technology’s rapidly changing landscape and so…

Contact Us

contact options transparent icons