732-926-0112
Login
09/12/2014
IT Executives Worried About Employees Using Chat Apps

Nearly 70 percent of companies are concerned about employees using third-party messaging and chat apps to communicate and send documents internally, according to a survey of 397 IT enterprise decision-makers by messaging and mobility specialist Infinite Convergence. The study also found that 59 percent of IT decision-makers think third-party messaging apps and chat tools are […]

Read More
09/11/2014
Employees Slow to Report Stolen Mobile Devices

As the rate of stolen mobile devices has increased, the average time for IT departments to respond to this security threat has also grown, according to a Kaspersky Lab survey of global IT security professionals. The report found that more than one-third of employees (38 percent) take up to two days to notify their employers […]

Read More
09/11/2014
Attackers Compromise Vulnerable Web Servers to Power DDoS Assaults

Web servers based on both Linux and Windows are rapidly being targeted by attackers and turned into server-side botnets capable of high-bandwidth denial-of-service attacks, two security firms stated in recently published analyses. On one hand, attackers are targeting unpatched or poorly-maintained Linux systems, exploiting known vulnerabilities and installing bot software to conscript the computers into […]

Read More
09/11/2014
HP Demonstrates Why Everybody Needs to Think Like the 'Bad Guys'

Angela Gunn, an old friend who is working as a security researcher these days  was explaining some of the problems with traditional approaches to thinking about security. But she is focused on Hewlett-Packard's latest push, which is to think like a bad guy trying to break into computer networks and databases. We were both attending […]

Read More
09/10/2014
Who Owns EHR Data?

The owners of electronic health records aren't necessarily the patients. How much control should patients have? Electronic medical records contain highly personal information, from illnesses to family matters to emotional statuses. Yet those records don't necessarily belong to the patient. The question this raises in the digital age is: Just how much control should people […]

Read More
09/10/2014
Microsoft Patches 37 IE Security Vulnerabilities in September Update

The seemingly endless stream of Internet Explorer security flaws continues. Is there an end in sight? Microsoft today released its September Patch Tuesday update, with Internet Explorer topping the list of vulnerabilities. This month, Microsoft is patching 37 vulnerabilities in IE, of which 36 were reported privately and one was publicly disclosed. Ross Barrett, senior […]

Read More
09/10/2014
CEOs Look to IT Leaders for Future Success, Growth

Almost all CEOs and business owners believe their company’s IT department with play a critical role in their business in 2015, a Modis survey found. Almost all CEOs and business owners believe their company’s IT department with play a critical role in their business in 2015, a Modis survey found. - See more at: http://www.eweek.com/small-business/ceos-look-to-it-leaders-for-future-success-growth.html#sthash.LXvJ4W1F.dpuf […]

Read More
09/09/2014
Navigating New Internet Domains

New Internet domain extensions keep increasing. Registering for one is pricey, but most businesses can't afford not to. For a long time, only 22 generic top level domains (gTLDs), such as .com, .org, and .edu, were available for businesses looking to set up shop online. But since opening up applications for new gTLDs in 2011, […]

Read More
09/04/2014
Attack hijacks DNS settings on home routers in Brazil

An ongoing attack in Brazil tricks users into visiting malicious websites that attempt to silently change the Domain Name System settings of their home routers. If the attack is successful, the routers are reconfigured to use rogue DNS servers that redirect victims to phishing pages when they open banking sites, said Fabio Assolini, a security […]

Read More
09/04/2014
Data Recovery Testing: The One Test That Will Save Your Business!

Every business owner understands the importance of planning and the proper implementation of said plans. However, after everything is set up, it's easy to overlook the testing of one's plans, which can really come back to hurt you when all of your careful planning falls apart. Nowhere is this more true than with data recovery. […]

Read More
1 11 12 13 14 15 19
Copyright © 2024 QWERTY CONCEPTS, Inc   |   All Rights Reserved   |   Sitemap   |   Managed IT services provider for New Jersey and New York City businesses