by Dan Siebert | Mar 22, 2016 | Security, Technology, Training
Although it is the last item on the Legal Tech News Nine Steps to Fight Crypto Locker, this rapidly changing exploit needs more attention…Cryptolocker Malware prevention requires awareness. Training everybody you know and work with is the answer. “Security...
by david | Dec 9, 2015 | Security, Technology
One of our customers found themselves proud owners of some new- technology from Time Warner Business Class. We got the call yesterday because although they are paying for cable internet service, it didn’t include wireless. So we installed a used 450 Mbps Wireless...
by david | Apr 16, 2015 | Clouds, IT Blueprint, Technology
Best reason to IT Blueprint (Clouds, IT Blueprint, Technology) The best reason to IT Blueprint…peace-of-mind. I•T (eye tee) Blue•Print (blo͞oˈprĭntˌ) n. A contact print of a drawing or other image rendered as white lines on a...
by david | Apr 2, 2015 | Clouds, Security, Technology
Phishing scams 2015 on the rise ahead of April 15 The IRS warned at the beginning of the year that they expected an onslaught of malware and targeted phishing scams 2015. As the tax filing deadline for Businesses came and went in mid march the attacks...
by Dan Siebert | Mar 15, 2015 | Clouds, Desktop Apps, IT Blueprint, Security, Technology
5 easy steps to reduce info security risks are really as easy, and many people and companies are taking them up today. User training is the most important and easiest key to a better info-security profile for businesses. Most of the big corporations and even large...
by david | Feb 24, 2015 | Clouds, IT Blueprint, Technology, Web presence
Customer Management is all about how your prospects feel about your offering. The best way to get them to the emotion they want is to get back to the basics: Understanding the three critical elements in everything we do – People, Process, Tools. It is the coffee you...