Data protection and security update LinkedIn

Data Protection and Password Security Update: LinkedIn On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog https://blog.linkedin.com/2012/06/07/taking-steps-to-protect-our-members/ ”LinkedIn learned that approximately 6.5 million hashed LinkedIn passwords were posted on a hacker site. Most of the passwords on the list appear to remain hashed and hard to […]

PC Repair Tips to Improve Performance

PC Repair Tips to Improve Performance Over time Windows Personal Computers and Laptops need ongoing repair to keep them running smoothly. Why waste time and office productivity when you can proactively repair and maintain your PCs for optimal performance? Here are some tips you may try yourself or ask your IT Professional about for support. […]

Cloud Computing: Your Pre Flight Check List

Cloud Computing: Your Pre Flight Checklist Cloud computing is more than a passing trend. Cloud computing is a way for small to medium businesses (SMBs) to tap enterprise class applications and infrastructure that once only large companies could afford. Cloud Computing allows SMBs to share the overhead for data center security, bandwidth, monitoring and management. […]

Computer Repair vs. New Computer?

Are you ready to upgrade your desktop and laptop computers?  Expect lots of exciting new changes to come out later this year. Unless your needs are urgent, you may want to wait until the Fall.  Here is what to expect in the new computer market, along with tips to help you squeeze  the most out […]

Is Your Network Safer Than The Titanic?

One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting your IT assets and critical data at risk. Here are several steps you […]

Why you should audit your network.

Do you know what’s connected to your network? If not, you should! Auditing your network and creating an inventory of your IT assets catalogs all devices connected to your network including PCs, laptops, printers, routers and switches. In some cases, assets discovered may even be unauthorized. By scanning and discovering all connected devices, your IT […]