City of Atlanta Cyber Attack

Why You Need an Intrusion Prevention System (IPS) on Your Server

Why You Need an Intrusion Prevention System (IPS) on Your Server In recent posts, we’ve discussed the importance of an Intrusion Prevention System (IPS) as opposed to simply an Intrusion Detection System (IDS).  The IDS simply detects a cyber attack, whereas an IPS takes this to the next level and PREVENTS an attack by taking

Why you need an Intrusion Prevention System (IPS) on your Network

Why you need an Intrusion Prevention System (IPS) on your Network In our recent post, we discussed the history and evolution from an Intrusion Detection System to an Intrusion Prevention System, specifically as it relates to your workstations.  Let’s get even more secure by talking about an Intrusion Prevention System on your Network. Additional Layer

Why you need an Intrusion Prevention System (IPS) on your Workstation

Why you need an Intrusion Prevention System (IPS) on your Workstation Evolution to Intrusion Prevention Systems Intrusion Prevention Systems (IPS) are the new evolution of what was once an Intrusion Detection System. Intrusion Detection Systems detected a cyber attack happening and would alert the IT department or Information Security Department in order for them to

Web based email

Online Security: The Pitfalls of Web-Based Email

Online Security: The Pitfalls of Web-Based Email A lot of small businesses are using webmail, and what we mean by that is free webmail like Gmail, Yahoo, AOL, et cetera. Let’s go over why it’s not a good idea because of all of the pitfalls of web-based email.  “Free” Isn’t Always the Best Choice for

How long would it take to restore your business's data?

Data Backup: Why your Business needs Image-Based Backups

Data Backup: Why your Business needs Image-Based Backups Your business’s data is one of your most valuable assets.  But what will happen in the event of a disaster, whether it’s a hacker or a natural disaster? We’re going to discuss with you the importance of your backup and why your business needs image-based backups. Image-Based

Computer station IT, guy work

Small Business Information Technology Services

Small Business Information Technology Services 24×7 Protect IT, specializing in helping small businesses do business securely™. Key advantages of 24×7 Protect IT’s unique business consulting solution: Work Anywhere in the World – Securely Secure Access & Backups Scalable – Only Pay for IT Services You Need Increased Profit Margins Competitive Advantage The term Information Technology

Microsoft Support Scam

Microsoft Support Scam I am sure you or someone you know has come across this Microsoft Support Scam: One of my peers, who is clearly a brilliant software Engineer, came up with a rather creative and hilarious solution. How would you like to be able to report this phone number to him? He will verify

Are Computers Really Disposable?

I am sure many of you reading this have answered yes, computers are disposable. I challenge the rational for your belief. Not because I am smarter than you, but because I remember. I will agree that disposable computers do exist and they are purposefully manufactured to be disposable. How many of you recall Gateway© computers