The Dangerous Consequences of Posting Pics, and 3 Steps You Can Take to Protect Yourself

Technetics ConsultingBlogsLeave a Comment

Today, almost everybody has an Internet-connected camera in their pocket. A crazy amount of photos are posted online. In fact, Facebook alone claims to have over 250 billion photos, with 350 million user images posted every day. All of these pictures are fun, but how do you ensure that only the people you want to see your photos are seeing … Read More

Have You Experienced Internet Troubles Lately?

Technetics ConsultingBlogsLeave a Comment

You may have noticed last week that the Internet was having some trouble with its operating speeds, but now we know for sure why. The root of the problem lies in Tier 1’s Internet routers’ Border Gateway Protocol routing tables, which have exceeded their maximum size, and has brought about the failure of these routers to operate at maximum speed. … Read More

Oh No, My Laptop is Stolen! Now What? Here are 4 Steps.

Technetics ConsultingBlogsLeave a Comment

Picture this, you’re at the airport with your laptop, knocking out an important project between flights. Suddenly, you’re approached by some touristy-looking people about taking their picture. You’re a nice person so you grant them their request. After a longer-than-expected photo session, you return to your seat only to find that your laptop has been stolen. You’ve been conned. What’s … Read More

Even the White House Needs IT Services

Technetics ConsultingBlogsLeave a Comment

A change is happening in the White House. Mikey Dickerson, a Google site reliability engineer, has just been appointed by the United States government as the deputy federal CIO, proving that even the big wigs need consulting from time-to-time. One of Mikey Dickerson’s primary goals as the deputy federal CIO is to “help government IT function more like a private … Read More

DecryptCryptoLocker Provides Fix for Nasty Ransomware

Technetics ConsultingBlogsLeave a Comment

A few months ago, we mentioned that a ransomware called CryptoLocker was spreading at a dangerous rate due to the GameOver Zeus malware. The ransomware would lock down files on victims’ computers until a fee was paid, but not anymore. Now, with the help of FireEye and Fox-IT, a solution has been created called DecryptCryptoLocker. As we mentioned in a … Read More

Microsoft to Discontinue Support for Old Internet Explorer Versions

Technetics ConsultingBlogsLeave a Comment

In an attempt to push users toward the most recent installment of Internet Explorer (IE 11), Microsoft has announced that, as of January 2016, all older versions of Internet Explorer will reach their end-of-support date. This means discontinued patching and security update support, putting all who refuse the upgrade at risk. As with all good things, they must eventually come … Read More

Give Tech Security Credit When Credit Is Due

Technetics ConsultingBlogsLeave a Comment

We talk a lot about viruses or holes in supposedly sound security structures, but today it seems as if that’s all there is to talk about. It’s all about the latest vulnerability, or a hacking attack that left millions of people with compromised passwords. People always concentrate on the negative aspects of things without looking at the positives. But, regardless … Read More

Think You Don’t Have Time to Backup Your Data? Think Again!

Technetics ConsultingBlogsLeave a Comment

Do you think that you’re too busy to backup your company’s data? There may be many responsibilities you put off because it feels like you’re too busy for them; backing up your data shouldn’t be one of them. If you think you’re busy now, just wait until you’re faced with a data loss scenario! Running a Business Means Busyness We … Read More

How Employee Inaction Can Make IT Problems Worse

Technetics ConsultingBlogsLeave a Comment

Every business operates on a budget and every employee has a responsibility to make sure that their actions keep their company within said budget. Budgets don’t like surprises, and employees don’t like a busted budget being traced back to them. This reality can make things messy and expensive when it comes to doing IT the break-fix way. For example, let’s … Read More