Microsoft just released their Minimum Hardware Requirements, which states that Windows 10 version 2004 will no longer include 32-bit builds for OEM distribution. Before you assume you’re paying the same price for a lesser product, understand the key words here are “for OEM distribution”; essentially, manufacturers will only receive and be able to distribute 64-bit Windows 10 builds starting with the latest version of Windows.
According to TechRepublic, the CFO of a small company in Kentucky fell victim to a ransomware attack. Through an interview with the CFO, TechRepublic was able to reveal why the company chose to pay the ransom (in Bitcoin) to regain control of their systems.
We’ve recently learned about a new and intrusive trend where several well-known websites port scan your computer without prompt just by visiting them. The original article is linked here.
What’s port scanning?
First of all, a port scanner is an application designed to probe a server or host for open ports, which are often used by attackers to identify network services running on a host and to exploit vulnerabilities.
We talk to hundreds of businesses in Arizona every week and have found a pattern of small companies that tell us, “we’ve had the same IT Guy for 10+ years”. This article will help you discover if this still makes sense for your business.
Our definition of “IT Guy” is an outside IT person providing a business with IT services.
Arizona businesses should be aware of a recent act initiated in New York that looks to change the way companies approach security practices nationwide. The Stop Hacks and Improve Electronic Data Security Act, also known as the SHIELD Act, broadens the scope of consumer privacy and places requirements on protecting personal data for organizations that collect information on residents.
Let’s talk about the elephant in the waiting room.
If you’re subject to HIPAA and use free email, you’re taking an unnecessary risk with your business.
FYI, free email accounts typically end in domains such as @yahoo.com, @gmail.com, @live.
Over the years we’ve observed a lot of different takes on small businesses using IT. With over 30 million businesses of 500 employees or less, there’s a lot of variety.
With that being said, there are clearly different stages of what we’ve coined “IT Maturity Stages”. As small businesses increase in employee headcount and revenue, you’d hope their IT Maturity Stage would also increase to accommodate increased complexity, risks, and demand.
Many of our clients and businesses in general are experiencing the transition into the WFH (work-from-home) model. We’re seeing the challenges first hand and therefore we’re making it our mission to share advice that can benefit any business dealing with the initial WFH inefficiencies.
We're hearing from our peers located in coastal cities first about early coronavirus-related effects on the IT industry. One IT-related topic is the catastrophic closure of the smaller "IT Guy" and micro IT companies. This mission-critical relationship with an IT provider ending unexpectedly is leaving businesses vulnerable in more ways than one.
If you’re not already, it’s time to become aware of the risk of phishing attempts within your business. If you think you’ve figured out all the possible phishing attempts, think again. Hackers are always finding new ways to breach your security--looking for one opening of weakness to hack your business.