Need Help?

News & Notes

Spear Phishing Cyberthreat is Getting Worse

Spear Phishing Tries to Get You to Disclose Your Confidential Information In simple terms, spear phishing cyberthreat means receiving an email that looks like it came from someone you know, but actually isn’t. It is a threat for anyone, anywhere, and in any industry. They …

Outdated Technology You Need To Stop Using

Outdated Technology “Amazingly Seriously” Is Still In Use As you know tech changes quickly and using outdated technology can be harmful. 10 years ago, my phone flipped and usually lasted about 1 year. 5 years ago, Windows 8 released (ouch). 3 years ago, websites became …

Quantum Computing | Why it is Exciting for Business

Quantum Computing has created a Brave New World Since the 1960s, the power of computing has grown exponentially and is quickly reaching the physical limits of any further growth. Quantum computing is the next phase of computing as it is in its infancy and looks …

Business IT Resolutions for 2017

Every year brings new business IT challenges. Did you just join a gym? Along with your health, it is a good time to review your business IT health. As opposed to yoga pants and water bottles, in this case you need quality technician experience, training, …

Phishing Emails | 5 Ways to Spot ‘Em

Phishing Emails – No, Not Fishing Emails. They are the “Nigerian Prince” swindle of this decade. Despite our best efforts via enews, meetings, calls, and support tickets, if there is one question we get at Network Medics on a weekly basis – it’s about phishing …

1 Billion Hacked – Yahoo Security is Wayhoo Bad

Yahoo Hack in August 2013 Effects 1 Billion Accounts. The Yahoo hack has put another nail in the coffin with Yahoo as they disclosed they have suffered another hack of 1 Billion accounts. Thanks for the late notice on this Yahoo – even if you …

Cyber Risk Should Have Your Attention

Understanding Business Cyber Risk is No Longer an Option When we tell you that your network security is important – it is because business cyber risk and your fiduciary responsibility has exponentially become greater in even the last few years. At Network Medics, we deploy …

Password Policy Made Easy for Everyone

Password Policy Made Easy for Everyone Even with all the technology advances in recent years, a bad password policy is still the main culprit when it comes to network security breaches. I am guessing you probably use the same password for most things – perhaps …

Social Engineering | How It Impacts You

Social engineering is an art form. Whether it’s a spoofed email, phone call, or download link, social engineering is a researched and effective tactic to get you to give up confidential information. Social engineering not only can affect you, but can affect your business if …

Disaster Recovery: Question & Answer

We get a lot of questions about disaster recovery and our disaster recovery services so we put together the top five questions and our answers to each. Q1:   What is disaster recovery? From power outages to natural disasters, any organization can suffer major financial loss when …