Blog

27
Jan
Cloud Computing Services Austin

References to “the cloud” have become quite common in business today, and it’s helpful to understand the differences between IaaS and PaaS, which are two types of cloud computing services.   Infrastructure as a Service (IaaS) Basics Infrastructure as a Service, or IaaS, is a type of cloud computing and has become a popular topic […]

17
Jan

Modern cyber security requires that individuals and businesses pay close attention to developments in digital data and storage, and many companies deal with files that require compliance with HIPAA rules and cyber security. HIPAA is an acronym for the “Health Insurance Portability and Accountability Act,” and it was a law designed to protect health care […]

29
Dec
Microsoft Teams

At the beginning of November, Microsoft announced an addition to its Office 365 program: Microsoft Teams. Immediately after its release, the press began calling it the “Slack killer” because of the special features within it that were designed to compete with Slack. Microsoft expects the new feature to be available to the public in early […]

22
Dec
The Threat of DDoS Attacks and Botnet

Today’s computer user must guard against a variety of potential security problems that range from theft of data by cyber criminals to destruction of property via Trojan horses, viruses, and other malicious software. Distributed Denial of Service attacks, which are usually abbreviated to “DDOS attacks,” are one of the most harmful types of attacks since […]

28
Nov
two-step-authentication-network-safety

Sometimes called multi-factor authentication, two-factor authentication is when a computer requires the user to enter more than just a password to gain access. The majority of businesses require their employees to use nothing more than a single password to access their computers. However, an increase in “phishing” attacks and other malicious activities meant to steal […]

24
Nov
whaling-attack-it-austin-services

People inside and outside business have heard of “phishing” attacks, where a cyber criminal steals information or the identity of someone through the internet, but a new type of attack referred to as a “whaling” attack has emerged as yet another online hazard for small businesses, as well as large corporations. As your IT services company, […]