by Brian Jefferson | Aug 21, 2024 | IT Security Blog
What is an Operating System? An operating system, often called an OS, is the unsung hero behind every computing device you use. Whether it’s your desktop computer, your smartphone, or even the servers running the websites you visit, an operating system is...
by Brian Jefferson | Jul 25, 2024 | IT Security Blog
Understanding the July 2024 Global CrowdStrike Outage If you were trying to fly during the weekend of July 19th to 21st, you may have learned a new word: CrowdStrike. Most people weren’t aware of this company before its powerful security software caused over 8 million...
by Brian Jefferson | Jun 26, 2024 | IT Security Blog
Why Moving to Microsoft 365 Is a No-Brainer for Small Businesses Long ago now, businesses switched from pen and paper to software for just about every imaginable task. Today, software has changed the way we do business – with dozens of tools becoming essential...
by Brian Jefferson | May 3, 2024 | IT Security Blog
What Problems Can Hiring An MSP Solve? MSPs, or Managed IT Service Providers basically do what the label says: they provide managed IT services for small and medium sized businesses (SMBs). However, you might rightfully still be wondering what that really means, and...
by Brian Jefferson | Apr 10, 2024 | IT Security Blog
What is Hardware as a Service (HaaS) A small business can easily spend thousands of dollars (or more realistically, tens of thousands!) purchasing their computers and related hardware. This seemingly necessary expense is just the cost of doing business, right? While...
by Brian Jefferson | Mar 7, 2024 | IT Security Blog
Google Enforcing New Email Rules – February 2024 The war against spam emails is nothing new – although in recent years it may have felt like the spammers were winning. However, Google has rolled out new email rules that it hopes will help protect users...
by Brian Jefferson | Jan 25, 2024 | IT Security Blog
What is a Fake Antivirus? You’re browsing the internet, perhaps doing some online shopping or looking for inspiration for your next vacation, and then an alert splashes across your screen. In big red letters, the popup informs you that A VIRUS HAS BEEN DETECTED and...
by Brian Jefferson | Dec 15, 2023 | IT Security Blog
What is an Advanced Persistent Threat? The type of malware known as ‘Advanced Persistent Threats,’ or APTs, sounds like something out of a sci-fi action movie – reminiscent of the Terminator T-1000. And, like a futuristic movie villain, APTs are far more capable...
by Brian Jefferson | Nov 14, 2023 | IT Security Blog
What is a Rootkit? When you run an antivirus scan, you expect it will detect all kinds of malware and malicious code. However, rootkits are an insidious type of computer virus that are capable of remaining undetected, sometimes for years! They can allow hackers...
by Brian Jefferson | Oct 18, 2023 | IT Security Blog
What is a Man in the Middle Attack? Today it is easy to feel like you’re constantly being watched – surveillance cameras sit on every corner and every online service makes us sign away our privacy rights first. However, nefarious actors have gotten in on the...