Tech News

Explore Our Blog for valuable insights and thought leadership on industry best practices in managed IT services and enterprise IT trends.

RansomHouse data extortion
Cyber Breach

RansomHouse data extortion group: Pay up, or your data goes on sale!

RansomHouse is a new threat actor group believed to have come together in December of 2021. They have decided to use a n...

Personal Touch/Crossroads Technology Ransomware attack
Cyber Breach

Personal Touch/Crossroads Technology Ransomware attack

Health care providers and insurers in the United States are required to obey the laws and regulations related to providi...

virus or malware
Cyber Breach

How can I tell if my computer has a virus or malware?

One of the biggest questions you might ask yourself when you have problems with your computer or device is: “Do I have a...

Be Careful What You Wish For
News & Events

Be Careful What You Wish For

In November of last year, I gave my elderly father an ultimatum due to not being able to contact him when his medical is...

RedLine Malware
Cybersecurity

 Storing passwords in the browser allows RedLine Malware to breach private VPN

Cybersecurity has become much more challenging with the push to move workers to remote locations during this pandemic. W...

What are ICS and SCADA
Compliance and Regulatory

What are ICS and SCADA, and how do they impact your medical practice?

The health care industry is an ever-changing field full of advancements, both technical and medical.  It requires a...

What are a hacker's motivations
Cybersecurity

What are a hacker’s motivations?

If you have recently paid attention to the news, I am sure you have heard the term “hacker” at least several times. What...

TPM for Windows 11
Microsoft Quick Tips

TPM for Windows 11–What is it, and what does it do?

Short on time? Listen instead. What is TPM, and what does it do? The TPM as a concept was developed by the Trusted...

Deeply Rooted And Committed From the Top Down
Business

Deeply Rooted And Committed From the Top Down

In cybersecurity, or IT, or any job today, it can be tough to find a place to work that makes you feel like you are wher...

Internet of Things in life
Productivity

Controlling your Internet of Things (IoT) life

If you are beginning to wonder just how much IoT you have in your life and whether you should be concerned about it, the...

NPM package targets Russian and Belarusian systems
Cybersecurity

NPM package targets Russian and Belarusian systems in protest over Ukraine invasion

After the invasion of Ukraine by Russia, one developer of node packages changed the code in a package so that it would w...

scam_alert
News & Events Scams

Scammers Claiming to Represent the US Department of Justice Called Us!

Introduction:  It’s tax season in the United States, and the scammers are out in full force.  We were conta...