In this issue:
- Deepfakes Let Criminals Communicate Anonymously
- Our Staff Rocks!
- The Power of Voice Technology
- Drones Save the Day
- Our Clients Come First
In this issue:
Lessons Learned from the Colonial Pipeline Ransomware Attack
A ransomware attack took down the largest gasoline pipeline in the USA—running from Texas to New Jersey. How could this have been avoided? Here are some key lessons that apply to you and your organization:
Cybersecurity Inaction is an Invitation to a Ransomware Attack
The Colonial Pipeline did not put adequate security strictures in place.
A Little Humor and Fun at Work Make Our Service Even Better
Who says you can't have fun at work? We love what we do and adding a little humor and fun to both our and our client's day makes it even better.
Do you know a business owner who grills lunch for their staff every warm weather Friday? Who hosts a virtual wine tasting and a staff Jeopardy game after hours via Microsoft Teams to connect with her employees? What kind of organization has a staff snow angel competition as the 50th inch of snow descends on the office? What staff dresses up for Celebrate a Geek Day or brings their costumed pet to work on Dress Your Pet Day? IT Radix does all of this and more because one of our core values is to “Have Fun” which sets us apart from other boring IT companies.
Quick Tip: Test Your Backups Regularly!
Why: Data is the lifeblood of every business. Unfortunately, the risks and threats to the protection, privacy and usability of that data are endless. Follow the 3-2-1 method for backups:
3 A minimum of three unique copies of your data,
2 A minimum of two available locally and
1 One off-site or in the cloud.
Nouns Transform Into Technology Verbs
As we all know, nouns describe a person, place, or thing and verbs represent actions. But the makers of Schoolhouse Rock may need to compose a new catchy jingle, as the distinction between these two parts of speech is getting blurry.
Routine Backups Are Critical to Your Business
There is likely nothing more basic yet more important in information technology networks than a proper backup program being in place. Important data that is lost, stolen, or held for ransom can cripple an organization in an instant.
Small Businesses Are Prime Targets for Cybercrime
Remembering 24 different passwords, memorizing 4 PIN numbers and installing updates all the time is frustrating enough. Many of us also have to remember the alarm code for the door, the code for the alarm panel next to the door, the secret password to tell the alarm company, the passcode to your phone, the garage code.
Rob came to IT Radix with over 20 years of experience working in the IT field. He kicked off his career in the U.S. Air Force where he specialized in Communications Computer Systems Control. His military experience cemented his love for technology and launched him into an IT career path.
Put Security Measures in Place to Protect Your Business
Beekeeping has been around for over 4500 years. There are plenty of apiculturists that maintain hives for profit, yet far more enjoy the hobby. Both employ a variety of strategies to protect their hives.
Congratulations to our winner, Alex Brattstrom of Studio One Architecture, LLC, the lucky recipient of a Michaels' gift card!
QUESTION: Which interface uses images/icons to make it easier for the user?