.......................................

Latest News

An Interesting Statistic in the Net Neutrality Debate

Posted on May 19, 2014

The debate on net neutrality is raging from Washington to Silicon Valley right now. For those not up on the latest geek terms, the net neutrality debate is around whether internet service providers should be allowed to create ‘electronic toll roads’ on the Internet that would allow companies to pay extra fees in order to … Continue reading An Interesting Statistic in the Net Neutrality Debate »

UPDATE: Internet Explorer Security Flaw FIXED

Posted on May 1, 2014

Approximately 2 hours ago, Microsoft released a fix for all versions of Internet Explorer that removes the current vulnerability allowing an attacker the same rights as the user of a compromised computer. You can read the full release here (WARNING! Serious techie stuff ahead – proceed with caution): https://technet.microsoft.com/library/security/ms14-021 We have already initiated a campaign … Continue reading UPDATE: Internet Explorer Security Flaw FIXED »

Latest Internet Explorer Security Flaw

Posted on April 29, 2014

On Saturday night, Microsoft reported a new security flaw in Internet Explorer (versions 6 through 11) which when exploited can allow an attacker to have access to anything that the user account accessing the website has access to. As of now, the flaw is unpatched. Microsoft has not yet announced if they are going to … Continue reading Latest Internet Explorer Security Flaw »

Keep Prying Eyes Away from Data in the Cloud

Posted on April 10, 2014

In a previous blog post, we pointed out that your data in the cloud may not be as safe as you thought it was. As many of the stakeholders at the organizations where our IT Consultants serve in the role of virtual CIO read the post, they asked us how they could still take advantage … Continue reading Keep Prying Eyes Away from Data in the Cloud »

Widely Reported Internet Security Flaw – What You Need to Know

Posted on April 9, 2014

Reports of a flaw in one of the basic building blocks of Internet security have hit the press this morning, and in typical fashion there is a lot of FUD (Fear, Uncertainty, and Doubt) and sensationalism happening. We have already been contacted by a number of our customers about their exposure, so we wanted to … Continue reading Widely Reported Internet Security Flaw – What You Need to Know »

Moving Data to the Cloud? Hope You Trust Your Provider…

Posted on March 31, 2014

Most small and mid-market companies these days have had some type of discussion around the cloud. Many are even using the cloud or are developing their strategy to take advantage of what the cloud has to offer. In the IT consulting strategy sessions we hold with our customers, trying to figure out how to use … Continue reading Moving Data to the Cloud? Hope You Trust Your Provider… »

The Internet of Things – Part 2 of 2

Posted on March 26, 2014

In my last post, I opened a discussion on the Internet of Things, and loosely defined the category by breaking the devices down into two categories. This post is about the second of those two categories – those devices that are connected directly to the Internet. My favorite example from my own experience in this … Continue reading The Internet of Things – Part 2 of 2 »

URGENT ALERT: Microsoft Announces Zero Day Word Exploit

Posted on March 25, 2014

Late last night, Microsoft announced a newly discovered exploit that is in the wild that allows remote code execution by merely previewing an email in Microsoft Outlook (without clicking on it or taking any other action). Although this has not been patched yet, Microsoft has issued a Fix It solution which will disable use of … Continue reading URGENT ALERT: Microsoft Announces Zero Day Word Exploit »

The Internet of Things – Part 1 of 2

Posted on March 15, 2014

There has been a lot of ballyhoo in the press lately about the Internet of Things. As we always try to do with this blog, we’ve attempted to wade through the noise and reduce the topic down to what matters to small and mid-market companies as it relates to technology strategy. For the purposes of … Continue reading The Internet of Things – Part 1 of 2 »

New Worm Exploits Issue with Linksys Home Routers

Posted on February 19, 2014

Thanks to Mark Minasi (http://www.minasi.com) for bringing a new issue to our attention related to Linksys Home Routers. This is by FAR one of the most popular brands out there when it comes to home routers, so it is probably a good idea to check if one of these is in your house (or heaven … Continue reading New Worm Exploits Issue with Linksys Home Routers »