Blog

What are all those blinking lights?

Asked one of our new clients.  This firm operates in a unique niche in the audio publishing industry.  They rely heavily on computers, networks and the Internet for going about its daily business—communicating with vendors and clients.   In fact, it would be 100% true to say that their business as currently set up would not be able to operate without the Internet and a powerful internal computer network.

The Power of Patches

Unlike the tart taste of Sour Patch candy, software patches provide sweet results. Their intended purpose is to quickly push out fixes to known bugs as well as protection from ever-evolving viruses. Update patches:

Correct bugs within the software that make it perform less than optimal
Fix security holes
Add newer and more secure features
Remove old/unprotected features
Optimize the utilization of resources on the operating system
Update hardware drivers to increase software efficiency (due to the constant development of hardware)

When a new patch becomes available, it’s good practice to wait a day or two before updating.

Tech the Halls With Gifts of Old

Almost every one of us has the same problem every year…finding the right gift for that hard-to-buy-for person, the one who loves to have all the latest gadgets. This year he or she likely wants a Fitbit Blaze, an OLED 65” TV, an Apple Watch, the latest GoPro camera or maybe even a drone!

These tech-crazed folks are not a new thing; they have been around for a very long time.

December 2016 Trivia Challenge

Congratulations to our winner, Debbie Turner of United Fireproofing, the lucky recipient of a Candy Lover's Basket.

QUESTION: Which candy bar reminds us to "break out of the ordinary"?

(ANSWER: Butterfinger)

IT Security Tip #26: Review your backups especially the data selections and retention history

Quick Tip: Review your backup data selections and retention period to protect yourself from ransomware (even at home)!

Why?  The creators of the ransomware threats are taking things to new levels. Not only are they encrypting your data but if you enter an incorrect decryption multiple times, the ransomware starts deleting your data.