Technology Articles from MPA Networks

A Primer on Phishing Attacks

December 21st, 2016 by admin

Credit cards with a lock resting on top of them

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw...

Read Full Story »

Posted in: Cyber and Data Security

The End of the Samsung Galaxy Note 7: Device Explosions Trigger Full Recalls

December 13th, 2016 by admin

The word 'Samsung' with flames rising from it

In a rare move, Samsung fully recalled and discontinued production on its previously well-reviewed Galaxy Note 7 model following several verified cases of the devices catching fire. This unexpected turn of events has left a vacuum in the large smartphone...

Read Full Story »

Posted in: Hardware and Software

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

Yellow 'Anti Virus' in yellow on a black background

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of...

Read Full Story »

Posted in: Hardware and Software

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

User name and password dialog box

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach...

Read Full Story »

Posted in: Cyber and Data Security

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Cyber and Data Security

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

An iPhone 7 resting on a table top

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old...

Read Full Story »

Posted in: Hardware and Software

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

Finger touching a field of icons against a pale blue background

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack...

Read Full Story »

Posted in: Cyber and Data Security

Low Battery Life: Bringing Productivity to a Halt

October 26th, 2016 by admin

Stylized graphic of a AA battery with a green cape flying through the air

Work-disrupting messages like “please connect charger” and “plug in or find another power source” can be a huge source of frustration—not to mention a major productivity killer—for employees on the go. Nobody wants to see their phone battery go belly-up...

Read Full Story »

Posted in: Hardware and Software

Think Manually Running Hard Drive Defragmentation Is a Big Deal? Think Again

October 19th, 2016 by admin

Open hard drive sitting on a table with its internals exposed

Good news: Your IT staff can stop running regular hard drive defragmentation on your office computers. Improvements in technology have rendered this decade-old practice largely irrelevant. One less thing to worry about, as far as we’re concerned. Hard...

Read Full Story »

Posted in: Hardware and Software

Troubleshooting Step 1: Reboot

October 12th, 2016 by admin

Stylized graphic of two power buttons side-by-side, the one on the right one lit up in blue

While modern computers are much more stable than their ancestors, trying to get work done on a slow, malfunctioning computer is still a business world rite of passage. Troubleshooting bad behavior on your work computer can, of course, be a tedious...

Read Full Story »

Posted in: Hardware and Software

Overloaded, Weak Signals: Alleviating Common Wi-Fi Bottlenecks

September 28th, 2016 by admin

Cartoon graphic of a hand holding a tablet with a Wi-Fi symbol on the screen

If your staff is complaining about slow Internet access at your office, it’s time to consider how well the Wi-Fi network is configured. Slow Wi-Fi is best known, after all, for transforming an otherwise ideal work environment into a slow-boiling pot...

Read Full Story »

Posted in: Hardware and Software

IoT Devices to Make Your Office More Efficient

September 21st, 2016 by admin

Stylized graphic of a thermometer

IoT devices have incredible potential to make your office more efficient. Previously we’ve discussed the caveats IoT devices bring to the workplace a few times, but today we’re going to focus on how these devices can increase productivity. It’s easy...

Read Full Story »

Posted in: Hardware and Software

Water-Resistant Smartphones Are Here: What You Need to Know

September 13th, 2016 by admin

Graphic of an iPhone with an image of water droplets on the screen

Water-resistance probably isn’t on the feature checklist for your employee smartphones—but judging by how many of these devices meet an untimely end via liquid damage, it should be. It probably doesn't come as a surprise that dropping the device...

Read Full Story »

Posted in: Hardware and Software

Are Chromebooks Right for YOUR Business?

September 7th, 2016 by admin

White Acer laptop sitting on a white table, with a yellow flower in a glass to the side

Google’s Chromebook platform has the potential to replace traditional laptops and increase productivity for businesses, much like it has in the consumer market at large. For the uninitiated, Chromebooks are Cloud-oriented laptops that run most operations...

Read Full Story »

Posted in: Hardware and Software

Are Comatose Servers Draining Your Wallet and Leaving You Vulnerable?

August 30th, 2016 by admin

Black skull and crossbones graphic

Those old servers your business no longer uses—and keeps running anyway—are more than just a security risk: They’re hurting your firm’s bottom line. The term comatose server describes a functional server, connected to a network, that sits idle virtually...

Read Full Story »

Posted in: Hardware and Software

How To Select a Second Monitor

August 24th, 2016 by admin

White office desktop with 2 Dell monitors and an Apple keyboard around a coffee cup

Secondary monitors have incredible potential to increase productivity in the workplace. It might not seem like much, but minimizing, maximizing, and arranging application windows on a single computer monitor can take up a significant amount of time....

Read Full Story »

Posted in: Hardware and Software

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Cyber and Data Security

Don’t Forget About Printer Security

August 9th, 2016 by admin

Array of 6 white printer icons against backgrounds of various color

There was a time when printers—in your office or home—were considered relatively "simple" office equipment: plug it in, connect it to the local network, and keep the ink fresh, and there wasn't much else to worry about. But times have changed. Today's...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Looking at Data Storage Longevity

August 2nd, 2016 by admin

Oblong view of a depiction of the internal workings of a mechanical hard drive

Not all storage devices were built to stand the test of time, so it’s important for every business to ensure its data is backed up on a reliable platform. If you’ve ever needed to reference financial records or court cases from a decade ago, you’ll...

Read Full Story »

Posted in: Hardware and Software

Are “Bandwidth Hogs” Slowing Your Network?

July 26th, 2016 by admin

Dials on a modern car showing a speedometer, tachometer, and other information

Last time, we talked about several handy do-it-yourself online tools to measure your office broadband speed. If your online connections aren't quite as fast as you expected from your service provider, don't be afraid to show them the "hard numbers"...

Read Full Story »

Posted in: Hardware and Software

Is Your Broadband Fast Enough? Here’s How to Check

July 19th, 2016 by admin

Simple representation of a wireless signal: a circle with 3 waves emanating from it

How fast is your company's broadband Internet speed compared to ten years ago? Chances are that while your online connection at work back then was faster than your first home Internet service (think of that annoying dial-up modem noise), if you tried...

Read Full Story »

Posted in: Hardware and Software

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

You Have Been Hacked - cartoon of a robber climbing out of a black laptop

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different...

Read Full Story »

Posted in: Cyber and Data Security

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

A man's forearm wearing a smart watch displaying numerous colorful icons

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing...

Read Full Story »

Posted in: Hardware and Software

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

Large, shiny red '7' in a blocky format

Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission...

Read Full Story »

Posted in: Cyber and Data Security

Is It Time to Switch to Flash Storage?

June 21st, 2016 by admin

Graphic of a open, gray filing cabinet outlined in blue

More and more businesses are switching their storage solutions from hard disk drives (HDDs) to solid state drives (SSDs) for one simple reason: the appeal of faster loading times and increased productivity. However, HDDs can still be the better choice...

Read Full Story »

Posted in: Hardware and Software

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

Businessman reviewing 3 papers while poised to write on one with a fancy pen

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP...

Read Full Story »

Posted in: Cyber and Data Security

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

Sepia-tinted close up of an eraser on the back of a pencil

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Cyber and Data Security

Windows 10 Free Upgrade Window Comes to an End

May 24th, 2016 by admin

Stylized depiction of the modern Windows start menu with a blue '10' overlaid

Those “Upgrade to Windows 10” notifications seem to be showing up everywhere, even in the middle of a weather forecast on Iowa television. What would’ve otherwise been an embarrassing interruption turned into a watercooler moment that anyone who used...

Read Full Story »

Posted in: Hardware and Software

How To Choose a Desktop Monitor

May 17th, 2016 by admin

Graphical render of a standard desktop PC, with monitor, keyboard, mouse, and tower

Let’s talk about desktop monitors. In many companies, large or small, an onboarding employee gets whatever display hardware might already reside in their assigned cube—no matter how old it is. But like most computer products, the technology is always...

Read Full Story »

Posted in: Hardware and Software

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Hardware and Software

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Red and yellow depiction of a ringing alarm clock with hands at 12:15

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not...

Read Full Story »

Posted in: Hardware and Software

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Cartoon of a brown picket fence with green grass in front and shrubs on the other side

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it....

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

Cybercrime Begins Over the Phone, Too - Don't Let Your Employees Forget

April 19th, 2016 by admin

Clip art of a red rotary telephone

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers...

Read Full Story »

Posted in: Cyber and Data Security

The Best Way to Check Your PCs for Malware - Fast and FREE

April 12th, 2016 by admin

Clip art of two badges, one red with an 'X' and the other green with a check mark

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks...

Read Full Story »

Posted in: Cyber and Data Security

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

Silhouette of a running man carrying a giant 1 Euro coin, against a blue digital cityscape

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed...

Read Full Story »

Posted in: Cyber and Data Security

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

Life preserver in alternating red and white colors, hanging on a wooden wall

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA...

Read Full Story »

Posted in: Cyber and Data Security

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

IoT Devices: Security Holes?

March 15th, 2016 by admin

Cloud of icons connecting to other icons on a blue background

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

Close up of a woman with pink fingernails using an iPhone while carrying a black bag

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook,...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

Two iPhones against a shiny black background, one with a red case and the other pale blue

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle...

Read Full Story »

Posted in: Hardware and Software

Internet Explorer: Upgrade Your Relationship or Break Up?

February 25th, 2016 by admin

A compass surrounded by the logos for Internet Explorer, Mozilla Firefox, and Google Chrome

The end is here for all versions of Microsoft’s Internet Explorer outside of the most recent version. If your business is still using older versions of the browser, it’s important to switch to a different browser—or upgrade to maintain the latest in...

Read Full Story »

Posted in: Hardware and Software

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A lock with a black and yellow hazard stripe, with a key inserted into it

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of...

Read Full Story »

Posted in: Cyber and Data Security

Upgrading to Windows 10: Why You Should (Still) Wait

February 11th, 2016 by admin

Red sign depicting in white lettering 'Do Not Enter'

We were as optimistic as anyone about Microsoft's long-awaited release of the Windows 10 operating system. As we discussed last May, we looked forward to real improvements—chiefly a better desktop interface—over its widely unloved predecessor, Windows...

Read Full Story »

Posted in: Hardware and Software

The Dangers of Free Public Wi-Fi: How To Protect Your Network

February 2nd, 2016 by admin

Light blue depiction of a wireless symbol

How dependent have you and your employees become on public Wi-Fi outside the office? Mobile hotspots are almost everywhere now—from coffee houses and fast-food restaurants to hotels and airports (and even aboard most planes). Without Wi-Fi access,...

Read Full Story »

Posted in: Cyber and Data Security

Transitioning to the Cloud? “Know Before You Go”

January 26th, 2016 by admin

Stylized cloud with an open door in the center of it

The Cloud is here to stay—and growing before our eyes. Even the customer segment that the marketing world terms late adopters—the last people to "get on the boat" of tech trends—are finally taking a hard look at migrating at least some of their IT to...

Read Full Story »

Posted in: Hardware and Software

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

Clip art of a hand holding a bag with a dollar sign on it, in black and white

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned...

Read Full Story »

Posted in: Cyber and Data Security

Standing Desks: Could They Improve Your Workplace?

January 12th, 2016 by admin

Woman in a red jacket using a laptop while reaching for a cup of coffee

It's been talked about everywhere from the New York Times to Men's Health and Women's Health: Sitting at a desk all day may be dangerously unhealthy. Medical studies conducted around the world support the same conclusion: When a human body...

Read Full Story »

Posted in: Solutions, Hardware and Software

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

'Do Not Enter' traffic sign of a red circle with a white horizontal line

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with...

Read Full Story »

Posted in: Cyber and Data Security