With kids back to school there are a lot of things to worry about. Getting them to class in time, making sure they have something to eat, and their homework is in their backpack. Unlike in our youth, kids have technology at their fingertips and are quick to explore the cyber world on their phones, but are they staying safe?

Read More

By now you should have trained your employees on what an attack might look like. Now what? Training an employee is half the battle. Not only do they need to know what NOT to do, they need to know what TO DO when a challenge presents itself.  Next, employees need to be aware of internal changes that could directly impact them or their environment, and what to do in case your company does fall victim to an attack. One might call this a Security Plan… 

Read More

Last week in The Ping: State of Cybersecurity, we spoke about the rise of cybercrime. Cyber criminals are continuing to find ways to access both personal and organizational networks. The good news is that there are a few things you can do to help prevent this from happening to you and your company.

Read More

Last week we discussed the consequences of allowing your systems to pass their end of life and continuing to use them. One of the larger issues is the increased potential of malware on your machines. Not only can this affect your desktops, but it can spread to the whole network. With malware attacks not slowing down, is this really a chance you can afford to take?

Read More

We’ve been talking a lot about how end of life can negatively impact commonly used servers and desktops, but did you know this can affect your email software as well? In addition to Server 2008 and Windows 7, Exchange 2010 will be ending their support in January of 2020, which means any updates and patches will cease for your email as well.

Read More

Now that you know what EOL (end of life) means, let’s discuss what that means to your business. Previously mentioned in The Ping: End of Life, allowing end of life software on your network can leave you susceptible to malware and allow your company software to lose the ability to obtain updates and upgrades on either a server or desktop platform.

Read More

With every Microsoft product you purchase there is a known EOL, or End of Life. Simply put, it’s an expiration date for your software or licensing. The most common reason is due to advancements and/or changes in technology that lead to your current purchases becoming obsolete. That is not to say that the software or devices that you recently purchased aren’t advanced for their current life cycle, but at one time we also believed that Windows 95 was so advanced we couldn’t imagine we would ever need a new operating system again. Fast forward to 2019 and we are 8 OS versions past Windows 95 with Windows 10.

Read More

We’ve talked a lot about what you can do on a smaller scale to keep your home and personal IoT (Internet of Things) devices secure, but what about your home network? While it might not seem like it, your home has its own network infrastructure. Most people assume that if their network is up and running and they can connect to the internet, then everything is okay. Like your car, assuming that it is running fine is not the best way to handle it. You need to maintain your network and check up on it regularly. So you are probably asking, what exactly does that entail?

Read More

It is probably safe to say that the majority of us carry around some type of smart device. Whether it is an iPhone, Galaxy, Pixel, Note, or Jitterbug, these devices play a huge role in our daily lives. We use these “phones” more for interacting with the internet than to talk, on the phone, to real live people. We routinely access almost all of our personal information including email, social media, and even confidential information such as banking or business from them. Not to mention our phones often act as the “remote control” that gives us the ability to control the smart devices in our IoT (Internet of Things) network (i.e. lightbulbs, garage doors, security systems, etc.). What’s true is that most of us have setup a screen unlock code or pattern to access our devices, apps, and data in an effort to secure our information. We also rarely let it out of our sight in order to feel like the information is safe, but that’s really not the case.

Read More

With the hustle and bustle of day-to-day life a personal assistant surely would come in handy, right? While this may not be fiscally responsible, maybe a voice assistant would be. In our last article, The Ping: Voice Assistants, we discussed how a voice assistant can manage a lot of your needs. Things such as the weather for the day, the traffic to work and your grocery list. However, sometimes just managing your house is what you need the most help with. Are you aware that they can do that too and what they are really managing?

Read More