What’s Happening in the Shadows

The Risks and Rewards of Shadow IT
Shadow IT is when individuals in an organization use technology services or solutions without approval or oversight by management and IT. It’s simply IT that happens in the shadows. Just like an artist who might wish to create depth in a painting by adding shadows, staff often create shadow IT systems with the best of intentions.

Patch IT Up!

Software Patches are a Part of Essential Preventive Maintenance to Keep Machines and Networks Safe
The expected lifespan of cotton fabric is over 100 years. Yes, that nice blouse or shirt or those pants you look great in can have an extended life of that range! Too bad fashion makes some of these items outdated almost as fast as technology makes hardware and software obsolete! Of course, even during its short fashionable life sometimes that article of clothing might need some patching or repair sewing done to address some rips or tears.

Learn What Microsoft Teams Can Do For You!

Microsoft Teams Makes Collaborating Between Coworkers a Breeze
Collaboration between coworkers has greatly expanded thanks to Microsoft Teams. And with so many people working remotely, this functionality/capability has never been more necessary.
Microsoft Teams is more than just messaging
When a team is created, users get access to everything that comes with that team.

Warning! Danger Will Robinson!

Some may remember Lost in Space, a TV show from the late 1960s. The Robinson family set off to colonize space, and suddenly were thrown off course, stranded in a perilous environment, light years from their desired destination. Luckily, “Robot” would alert the young Robinson boy to hazards by shouting “Danger Will Robinson!”

No one has a safety robot or even a map or GPS device to facilitate safe travels over the world wide web.

What You Don’t See

We have all heard the question: "If a tree falls in a forest and no one is around to hear it, did it really happen?" That thought raises philosophical issues regarding our powers of observation and perception. When each of us are in our “me” centered world, we sometimes think that if we did not see or hear something, then it was not important, or worse that it did not happen.

Keep IT Safe

Confession time! How many of you manage your computer and online passwords in any of the following ways:

Use the same/similar password for everything
Keep all your passwords written on a slip of paper
Change your password by incrementing the number by 1
Keep a spreadsheet with all your passwords on your desktop

We see it all the time and have heard every reason you can think of as to why it’s “fine”. The most common of which is “I don’t have any data a hacker would want”. Nothing could be further from the truth! Have you ever thought about what a hacker could do with just your email password? With just access to your email, a hacker only needs to click the “I forgot my password” button for any of your accounts and will instantly have the keys to the kingdom.

What Else Can Be Hacked?

With the explosion of Internet of Things (IoT) devices, the list of things to hack has also exploded. If one takes a moment to consider the potential risks, it can be eye opening and downright scary—just in time for Halloween. Peruse the Internet a bit and you will find real hacking examples that include pacemakers, children’s teddy bears, baby monitors, vehicles, security cameras, and more.