About admin

This author has not yet filled in any details.
So far admin has created 13 blog entries.

Guidance – SMB IT Security has 4 layers

SMB IT Security has 4 layers by mgrit.com.au Today’s IT environment is littered with constant attacks to compromise the security of your data. In SMB networks a structured, layered approach to IT security is often overlooked as business owners have more pressing issues to consider. Many business owners consider basic or even free Anti-Virus products sufficient [...]

By | 2017-05-22T16:23:53+00:00 May 22nd, 2017|Uncategorized|0 Comments

UC Berkeley: Top 10 Secure Computing Tips

Top 10 Secure Computing Tips Tip #1 - You are a target to hackers Don't ever say "It won't happen to me".  We are all at risk and the stakes are high - to your personal and financial well-being, and to the University's standing and reputation. Keeping campus computing resources secure is everyone's responsibility. [...]

By | 2017-05-16T14:31:50+00:00 May 16th, 2017|Uncategorized|0 Comments

Virtual Desktops and Ransomware

Is VDI susceptible to ransomware threats? by Brien Posey @BrienPosey Check out Brien’s new book “Conversational Rocket Science”, available for free download at https://t.co/HZuU5b6n1h “Virtual Desktop Infrastructure”, for example Microsoft Remote Desktop, Citrix   VDI environments are in danger of ransomware attacks. They can encrypt personal and professional data that cannot be decoded [...]

By | 2017-05-15T21:46:37+00:00 May 15th, 2017|Uncategorized|0 Comments

Calculating the Cost of Downtime

Calculating the Cost of Downtime © 2017 Continuum Managed Services is a resource for managed services providers such as Thin-nology. October 11, 2016 • by Mary McCoy Several factors contribute to the total cost of downtime: Cost of Downtime (per hour) = Lost Revenue + Lost Productivity + Cost to recover + Cost of [...]

By | 2017-05-12T13:30:42+00:00 May 11th, 2017|Knowledge Center|0 Comments

Ransomware and the Crypto Virus- you need to know

So, you arrived at work this morning, opened your email and found you have a package about to be delivered from UPS. Just open the attachment to find the details. Your first thoughts are, I don’t remember ordering anything. Then you think, someone must be sending something, but what, and why haven’t they told me? [...]

By | 2017-04-19T15:22:10+00:00 April 19th, 2017|Uncategorized|0 Comments

Bring Your Own Device (BYOD): A Checklist for Business Owners

Bring Your Own Device (BYOD): A Checklist for Business Owners Is your IT policy holding your company and your employees back from embracing BYOD? If so, use this checklist and start building an IT policy that embraces the future and protects your business. Know Your Devices Establish which devices you are ready to support. [...]

By | 2017-04-19T18:51:27+00:00 April 14th, 2017|Knowledge Center|0 Comments

Something for Nothing- A Phish Tale

Jon Bowling, President Thin-nology So, you got a message from a lawyer explaining that a relative your family had never told you about has died and left you, his only relative, his fortune.  You read on to realize that the reason your family had never spoken of this rich relative is because he had [...]

By | 2017-04-19T18:51:50+00:00 April 11th, 2017|Knowledge Center|0 Comments

Phishing on the rise, folks!

Now that the election is over and the “Russians worked to influence the election”, and discussions have given way to the evil Assad, I thought this would be a good time to discuss phishing. There are a number of variants to phishing. Today we’ll discuss how the “Russian” conversation got going. In the twilight [...]

By | 2017-04-19T18:52:17+00:00 April 10th, 2017|Knowledge Center|0 Comments

Read about data security again! It’s that important to get right.

The importance of a sound data storage and recovery plan Jon Bowling – President Thin-nology  I talked to my lawyer in Houston the other day and asked him, “Bussell, do you backup all the data you generate?” […]

By | 2017-04-19T18:52:42+00:00 April 7th, 2017|Knowledge Center|0 Comments