Author Archives: Austin

Password Hashing and Salting

These days, it’s not so much a question of whether you’ll get hacked as when. More likely than not, at some point during the life of your organization, a hacker will gain access to your password database. If that happens, how much do you need to panic? That depends on how your passwords are stored. […]

Read More...

How Often Should I Make New Backups?

You’re probably familiar with the concept that backups are important. Everyone company that has a website, or corporate email, or digital sales records, or a blog, needs to have backups. If you have something important stored digitally, the in-use copy should not be the only copy. But do you know how often you need to […]

Read More...

Beat Password Crackers with Two-Factor Authentication

The fight for bigger and better passwords can seem as futile as it is neverending. If hackers can’t guess your password, you probably can’t remember it, either. For the latest in IT Security you can use something other than a password to let your users log in to your website or app. Two-factor authentication puts […]

Read More...

To Wire or Not to Wire

To Wire or Not to Wire… When it comes to keeping your company connected to the web you’ve got two options: a wired network that uses Ethernet cords or a wireless network that relies on radio frequencies to broadcast the Internet. There are pros and cons to each: Wired Pros: Wired network are faster, more reliable, […]

Read More...

How to Tell the Three Signs You Need a Managed Service Provider

When you are a business owner or manager, you have a great many duties and responsibilities that rest on your shoulders. Because you are in charge of your business, you may feel as if you cannot possibly let any of the daily business operations be managed by an outside company. However, sometimes getting IT support […]

Read More...

Take Advantage of Your Device’s USB On-The-Go Capabilities

If your Android device lacks a microSD slot, expanding its memory and accessing USB-enabled peripherals can be quite the challenge. However, if your device is compatible with USB On-The-Go (USB OTG), things just got a little easier. USB OTG is the specification that turns devices into USB hosts, able to connect with computers, storage devices, […]

Read More...

7 Ways to Help Your Windows Computer Run Faster

Many different factors can cause computers to become slower and less responsive, no matter their age. Files might take longer to open, and applications might respond to commands at a snail’s pace. Fortunately, there are actions you can take to improve a Windows computer’s performance. Here are seven ways to speed up your computer: 1. […]

Read More...

How to Protect Your Business from Ransomware Attacks

The number of ransomware attacks is increasing at an alarming rate, making ransomware the biggest cyber threat that businesses are facing today. To see this disturbing trend, you only have to turn back the clock to the beginning of 2016. There was a 30 percent increase in the number of ransomware attacks in the first […]

Read More...

9 Signs That an Email Might Be a Phishing Scam

Phishing attacks are still a weapon of choice for cybercriminals. The most common way they carry out phishing attacks is through email messages. In email phishing scams, digital con-artists use a convincing pretence to lure you into performing an action — usually opening an attachment or clicking a link. Doing so can lead to malware […]

Read More...