banner-section
CALL US 402.398.9580

Is it time to upgrade your phone system?

Alyssa Sisco

Thankfully, phone system manufacturers have, overall, done a good job at creating a robust product that lasts for many years. But something to consider is that there's a difference between your technology still functioning and your technology working for you-- by saving time and making communication easier.For instance, you may still have a VHS player that functions, but that doesn't mean it's not time for an upgrade. Besides the generally grainy-quality of tapes and the inconvenience of having to rewind them after every use, new movies don't even come out in that format anymore. In the same way, if your phone system is stuck in the past, you're missing out on some great new pieces of software and it may be wasting more time and energy than you think.

Read More
Topics: Equipment Purchases, Phone Systems

Your first line of defense: Firewalls

Alyssa Sisco
Why do you need so many different pieces of software and hardware to keep your network safe? Of course you want to keep your data secure, but why can’t there be a one-size-fits-all solution that protects you from every threat imaginable? That would certainly simplify things, however with the expanse of the web and the continual chain of ever-evolving threats, it's essential that we guard our business with a multi-layered line of defense. This approach ensures that if a new threat is able to sneak its way past one piece of your security system, you have several others standing guard. Today, I would like to introduce you to an essential line of defense: firewalls.
Read More
Topics: Network Security

The solution to your password problems

Alyssa Sisco

I’m sure this isn’t the first time you’ve heard how important it is to use secure passwords online. But here we are in 2018 and “123456” was still the most hacked password of last year. With all the recent security breaches large companies have dealt with, it’s easy to see how anyone could have their online security compromised. That’s why it is so important to create strong, unique passwords for all your online accounts. Nobody wants to have their personal data stolen, or be the reason their company's data is held for a sizable ransom. So why are so many still risking their security by clinging to weak passwords? Let's look at some common reasons and introduce some solutions. 

Read More
Topics: Network Security

Recall: Check your HP notebooks and workstations

Alyssa Sisco

HP has put into effect a recall of certain batteries used in their notebook computers and mobile workstations due to safety concerns. The faulty batteries have the potential to overheat and catch fire or inflict burns, so it is important to check any HP products that could be affected. It is projected that almost 3% of the following HP products sold between December 2015 and December 2017 will be affected:

Read More
Topics: Alert

How many cybercriminals does it take to steal an identity?

Alyssa Sisco
Erase the stereotypical image of a lone, hooded man sitting in a dark room, stealing information to exploit for money. Cybercrime has become a well-oiled machine comprised of networks of organized tiers. In essence, an unethical service-based corporation, everyone has a specific job that contributes to the success of the business. Some cybercriminals are experts in hacking and stealing information, while others are good at turning that data into profit. Unfortunately for us, they have all found their way to each other and have learned that working together can be more profitable than lone-wolfing it.
Read More
Topics: Staff Training

Meet the Team: Robert Lockheed

Alyssa Sisco

Say hello to Robert! As a Tier III Systems Administrator, he helps solve some of the toughest IT issues we encounter. If you've ever had the pleasure of working with Robert, you know he loves to talk, but has he ever told you that he would have loved to have been there for the first moon landing?

Read More
Topics: Our Company

Keeping up with the Spectre and Meltdown vulnerabilities

Alyssa Sisco

This year certainly started off with a bang in the world of tech security. It’s not very often that in this day and age, a processor flaw becomes a substantial headline for mainstream news outlets. But when it impacts basically every computer or smartphone made in the past 15 years and could negatively affect billions of tech users, that’s kind of a big deal. Essentially, in the drive to create faster technology, some design decisions were made that unknowingly left our devices vulnerable to attack. However, do keep in mind, that even though Spectre and Meltdown have such a wide-spread possibility to cause harm, thus far there have been no known malicious exploits of these vulnerabilities.

Read More
Topics: Security Threats, Network Security

Meltdown & Spectre FAQ

Chris Vilim

PDF: Spectre and Meltdown FAQs

Read More
Topics: Security Threats

Quick Tip: Using Microsoft templates to track your goals

Alyssa Sisco
Since the new year is right around the corner, you’re probably working on coming up with some resolutions to better yourself and/or your business. If you need help coming up with some solid goals, explore our post on writing SMART goals. Once you decide what to conquer in 2018, you'll need a way of tracking your progress. One fun and easy method is to use Office 365 templates. Whether you need a calendar or planner to keep you organized, or a workout log or finance tracker to measure your progress, Office has made it incredibly easy for you to use their products for all of your specific needs. Check out the Template section of Office.com and see which templates could work to help you fulfill your objective. I'll go over a couple examples below, so you can get a feel for how you might utilize these templates.
Read More
Topics: Microsoft Products

Is your inbox a crime scene?

Alyssa Sisco

Much like the shiny lures fishermen use to attract their prey, cybercriminals use email attachments or links to try to get you to click through to malicious content. Often using cheap scare tactics, phishing scams will try to induce a quick, panicked response by making you feel like you have something to lose by not clicking on the link. The instant you click, you open yourself up to malware attacks that can cost you financially, technologically, reputationally, and it will definitely eat up time to reverse the damage that was enacted on your device (if you are able to reverse it at all).

Read More
Topics: Staff Training, Security Threats