Technology Articles from MPA Networks

Managing Automatic Updates: Balancing Security With Convenience

July 10th, 2018 by admin

Business mobile phones and other items on a table

Running automatic updates for applications and operating systems helps protect your company's digital devices, but those updates can harm productivity if not well managed. Unpatched software is the single biggest security risk in the workplace, so it's...

Read Full Story »

Posted in: Cyber and Data Security

Spectre and Meltdown: Valuable Lessons for Your IT Security Team

February 12th, 2018 by admin

White lock icon on a backdrop of code snippets

At the end of 2017, the world learned about Spectre and Meltdown: two far-reaching security threats that exploit how CPUs work to expose protected information on nearly every recent PC, server and smartphone. Hackers can use these exploits to do things...

Read Full Story »

Posted in: Cyber and Data Security

Four Security Threats Your Company Could Face in 2018

January 16th, 2018 by admin

Close up view of network ethernet cables plugged into ports on a switch/router

Hot off the tail of the massive 2017 Equifax breach that exposed personal information of 143 million customers, businesses are on high alert concerning IT security in 2018. While the IT security industry has been successful in mitigating and cracking...

Read Full Story »

Posted in: Cyber and Data Security

Wireless Charging in the Workplace: iPhone Joins Android

October 10th, 2017 by admin

Hand holding a white iPhone plugged in and charging from empty

Wireless charging in the workplace has the potential to make it easier for your employees keep their arsenal of devices running throughout the day with fewer of those pesky low battery warnings. Until recently, wireless charging hasn't been as good at...

Read Full Story »

Posted in: Hardware and Software

Screen Mirroring Mini-Guide

September 19th, 2017 by admin

Conference room with dark wood table, black and silver chairs, a speaker phone, and a tv display on the far wall

Setting up your conference room for wireless screen mirroring is the answer to employees sharing in a collective groan when it's time to connect a computer or mobile device to show a presentation. While setting up the conference room television or projector...

Read Full Story »

Posted in: Hardware and Software

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

Relief drawing of a pocket watch with roman numerals I through XII

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely,...

Read Full Story »

Posted in: Hardware and Software

Mesh Networking for SMB Offices

March 28th, 2017 by admin

Stylized representation of a wireless radio antenna with radio signals eminating from it

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional...

Read Full Story »

Posted in: Hardware and Software

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

Color logo of Google Drive(tm)

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's...

Read Full Story »

Posted in: Hardware and Software

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Cyber and Data Security

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

An iPhone 7 resting on a table top

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old...

Read Full Story »

Posted in: Hardware and Software

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

Two iphones against a shiny black background, one with a red case and the other pale blue

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle...

Read Full Story »

Posted in: Hardware and Software

Mobile Security Exploits: Surviving the BYOD Environment

November 19th, 2015 by admin

Businessman using a smartphone with his right hand

IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to...

Read Full Story »

Posted in: Hardware and Software

Apple TV for Presentations in the Workplace

May 1st, 2015 by admin

Woman's hands holding up an iPad displaying a colorful abstract image

Apple TV, typically used as a video content streaming device for Netflix, YouTube, and iTunes, is fairly common in homes across the U.S. However, this crafty little device that can fit in your palm also has some impressive applications in an office setting...

Read Full Story »

Posted in: Hardware and Software

Increase Productivity with Cloud Systems

December 23rd, 2014 by admin

Blue inked drawing of various icons with arrows pointing to a cloud

Cloud-based applications have the potential to increase productivity for your business. By de-localizing your computing resources, your employees can benefit from ease of access, broader device compatibility, and reliance on local hardware. IT Managed...

Read Full Story »

Posted in: Hardware and Software