Why do I keep getting this pop-up?

I originally was not going to post this, but received permission from the person it happened to… so.. Before our life in quarantine, there was a time were I was called in to help with a serious IT situation. A friend referred me to a doctor’s office that was having a computer issue. They were…

Read More

Not a fan of Acer, but…

I am generally not a fan of Acer, but in this case I have to admit that they got this right. Acer’s Swift 3 SF313 is a small subnotebook equipped with a 13.5-inch display. It is based on Intel’s latest Ice Lake SoC and successor to the Kaby Lake generation of devices. With an Intel…

Read More

Why Cyber-security is Important

John Ford, ConnectWise Chief Information Security Officer, put together a quick little video to explain what a Cyber Attack is and how it impacts your business. Your work life and personal life are not separate. Everyone checks their work email on their phone. Everyone looks at Facebook at work or check their personal email at…

Read More

Encryption People.. Encryption…

Tesco, a giant supermarket club in England, similar to Costco in the US, announced that 600,000 names and passwords were stolen. The thief made off with the company’s database. It is known that the data was used to gain access to other websites. None of the company’s financial data was accessed. But… Who cares about…

Read More

Most common forms of cyberattacks last year

New research from BlackBerry Limited shows hackers use different strategies and attack types, depending on the industry they’re targeting. For example, criminals targeting the technology and software industry are most concerned with stealing intellectual property. To that end, a quarter of attacks (26 percent) were ransom based. Healthcare organizations also encountered a high proportion of…

Read More