Avoiding Hardware Overkill: IT Consulting to the Rescue

July 18th, 2017 by admin

Spending far too much money on excessively overpowered computer hardware can quickly deplete your company's IT budget, taking funding away from other important expenses. Two exciting products released in June 2017, Apple's new iMac Pro ($4,999) and Intel's Core i9 CPU family (starting at $999), are poised...

Read Full Story »

Posted in: Hardware and Software,

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely, after all, to argue that replacing it would...

Read Full Story »

Posted in: Hardware and Software,

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this new malware "Fruitfly," and it's being used to target...

Read Full Story »

Posted in: Cyber and Data Security,

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old socket ends up being a step forward or a huge inconvenience....

Read Full Story »

Posted in: Hardware and Software,

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not before!). QuickTime was Apple's original media viewer,...

Read Full Story »

Posted in: Hardware and Software,

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. On March 4, researchers at security firm Palo Alto...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook, along with his wife, to gun down his San Bernardino...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software,

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous security flaw known in cybersecurity circles...

Read Full Story »

Posted in: Cyber and Data Security,

Apple TV for Presentations in the Workplace

May 1st, 2015 by admin

Apple TV, typically used as a video content streaming device for Netflix, YouTube, and iTunes, is fairly common in homes across the U.S. However, this crafty little device that can fit in your palm also has some impressive applications in an office setting through its AirPlay screen mirroring features....

Read Full Story »

Posted in: Hardware and Software,

Know Your Enemy: These New Phishing Schemes are Hard to Spot

April 16th, 2015 by admin

A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly relentless phishing schemes I'd like to share with...

Read Full Story »

Posted in: Cyber and Data Security,


Back to Top

Copyright © 2019 MPA Networks, Inc.

Atomic8Ball Web Presence Management