Technology Articles from MPA Networks

Be on the Lookout for Rising Number of COVID-19 Phishing Attacks

April 21st, 2020 by admin

A blue digital lock with various connected devices and a person hand pointing at the lock

Hackers will often look to exploit any weakness they can find, whether it is technological means or through human curiosity and concern. With the rapid rise of COVID-19 across the globe, hackers are ramping up their phishing attack efforts. These efforts...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Managing Automatic Updates: Balancing Security With Convenience

July 10th, 2018 by admin

Business mobile phones and other items on a table

Running automatic updates for applications and operating systems helps protect your company's digital devices, but those updates can harm productivity if not well managed. Unpatched software is the single biggest security risk in the workplace, so it's...

Read Full Story »

Posted in: Cyber and Data Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Cyber and Data Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network Ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Cyber and Data Security

Wireless Charging in the Workplace: iPhone Joins Android

October 10th, 2017 by admin

Hand holding a white iPhone plugged in and charging from empty

Wireless charging in the workplace has the potential to make it easier for your employees keep their arsenal of devices running throughout the day with fewer of those pesky low battery warnings. Until recently, wireless charging hasn't been as good at...

Read Full Story »

Posted in: Hardware and Software

Screen Mirroring Mini-Guide

September 19th, 2017 by admin

Conference room with dark wood table, black and silver chairs, a speaker phone, and a tv display on the far wall

Setting up your conference room for wireless screen mirroring is the answer to employees sharing in a collective groan when it's time to connect a computer or mobile device to show a presentation. While setting up the conference room television or projector...

Read Full Story »

Posted in: Hardware and Software

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Hardware and Software

Mesh Networking for SMB Offices

March 28th, 2017 by admin

Stylized representation of a wireless radio antenna with radio signals emanating from it

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional...

Read Full Story »

Posted in: Hardware and Software

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

Color logo of Google Drive(tm)

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's...

Read Full Story »

Posted in: Hardware and Software

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Cyber and Data Security

Are Chromebooks Right for YOUR Business?

September 7th, 2016 by admin

White Acer laptop sitting on a white table, with a yellow flower in a glass to the side

Google’s Chromebook platform has the potential to replace traditional laptops and increase productivity for businesses, much like it has in the consumer market at large. For the uninitiated, Chromebooks are Cloud-oriented laptops that run most operations...

Read Full Story »

Posted in: Hardware and Software

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Hardware and Software

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

Two iPhones against a shiny black background, one with a red case and the other pale blue

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle...

Read Full Story »

Posted in: Hardware and Software

Mobile Security Exploits: Surviving the BYOD Environment

November 19th, 2015 by admin

Businessman using a smartphone with his right hand

IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to...

Read Full Story »

Posted in: Hardware and Software

Increase Productivity with Cloud Systems

December 23rd, 2014 by admin

Blue inked drawing of various icons with arrows pointing to a cloud

Cloud-based applications have the potential to increase productivity for your business. By de-localizing your computing resources, your employees can benefit from ease of access, broader device compatibility, and reliance on local hardware. IT Managed...

Read Full Story »

Posted in: Hardware and Software