Contact Us Today!

WPA3 Wireless Security

WPA3 Wireless Security

Wireless networking isn’t going anywhere, and neither are the “bad guys” who are interested in penetrating your wireless network security. For this reason, we have wireless encryption like WEP, WPA, and WPA2. The next best thing is here, WPA3. Listed below are some great new features.

Tips to Protect Your Smartphone

Tips to Protect Your Smartphone

In today’s world, almost everyone owns a smart phone device. Not only do cyber criminals want to hack into your computer, they also want to gain access to your phone. Many people fail to realize that just because your phone is close by your side and not in someone else’s’ possession, that your information is safe and secure.

System Views vs My Views – Part Two of Two

System Views vs My Views – Part Two of Two

Sharing "My Views" with Teams
In Part One, I talked about the differences between System Views and My Views. I also mentioned that whenever possible to filter by dynamic values (current user, manager, territory, last month, next year, etc.).

What if you work for a company that has several different divisions and your user base works across multiple divisions? They would want to have access to their views but they don't necessarily have to see all of the views for all of the other divisions.

Help, my Office 365 account was hacked!

Help, my Office 365 account was hacked!

So you just got a call from one of your clients telling you that they received a strange e-mail from you with an attachment.  You know you haven't e-mailed them in days.  What could be going on?  You check your sent mail folder and to your surprise there are hundreds of sent messages to everyone in your contact list.

Beware: Nyetya is worse than WannaCry

Beware: Nyetya is worse than WannaCry

The cyber community hasn’t fully recovered from the WannaCry ransomware attacks, which struck businesses and organizations in May. Now, a Petya ransomware variant named Nyetya is poised to join its ranks as one of the worst cyber attacks in history. Like WannaCry, its attackers exploited unpatched Microsoft vulnerabilities and demanded a $300 ransom in Bitcoins.