The IT Blog for LA Businesses - Valuable Technology Insights

Blog Topics

Why You Need a Secure Network

After what was a record-setting year of cyber attacks and cyber crime, two of the most common questions I’m answering these days are: 1) “We have a firewall, so my network’s secure, right?” or 2) “You guys are monitoring my network, so it’s secure, ...

Read More
Share:

6 Steps to Protect Your Online Financial Information

These days, it’s pretty much the norm for people to conduct more and more financial transactions online. The business to business (B2B) online retail market is expected to reach revenues of $6.7 trillion — double the estimated size of the ...

Read More
Share:

6 Things To Know About the Spectre And Meltdown Security Exploits

It seems the internet is all abuzz with news of the latest cyber security flaws and how, literally, the sky is falling. That said, it's hard to really know where the truth lies. Don't get me wrong, this is serious. There are reports that every CPU ...

Read More
Share:

Why the Average User’s Cybersecurity Knowledge Should Scare You

The majority of the American public lacks basic cybersecurity knowledge. In a Pew Research Center survey of 1,055 adult internet users, most respondents could answer only five of 13 knowledge questions correctly regarding key cybersecurity terms and ...

Read More
Share:

7 Signs Your Business Needs a New IT Service Provider

In many relationships, there comes a time when something feels amiss — you can’t identify exactly what, but you get that gnawing feeling in your gut that tells you something is off. Often times, it gets to the point where you just know it’s not ...

Read More
Share:

7 Things Your Current IT Service Provider Doesn’t Want You to Know

As with any ongoing business relationship, there comes a time when you may need to reevaluate your relationship with your IT service provider. This could be because you make it a habit to reevaluate your vendor relationships on a regular basis or, ...

Read More
Share:

Remote Access Best Practices To Protect Your Business

The only thing constant in the universe is change.  Similarly, business is constantly moving, growing, and changing. These days, providing remote access has become more than just a "nice to have". For most businesses, it's become the defacto ...

Read More
Share:

Knowing Your Business’s Cybersecurity Awareness Training Level

I BM CEO Ginni Rometty has been quoted as saying, “Cyber crime is the greatest threat to every company in the world.” And, unfortunately, there are WAY too many stats to help back up her claim. Nearly half of all cyber attacks focus on small ...

Read More
Share:

Protecting Your Network from Ransomware in 8 Steps

Much like fashion, sometimes old technology trends become new again. Ransomware attacks, which were introduced in 1989, embody one such example of this cycle and have become increasingly prevalent over the past several years. Ransomware is a ...

Read More
Share:

Top 11 Questions for Vetting Your IT Service Provider

I've met with many potential clients over the years. However, it's rare that I hear a new question. Unfortunately, what I usually hear is the wrong set of questions. The questions that these clients ask often reveal how their previous company failed ...

Read More
Share:

Beware the Bad Rabbit (The Latest Rascally Ransomware)

Here we go again. And I'm not talking about that rascally rabbit Bugs Bunny acting up. On Tuesday, a new strand of ransomware named Bad Rabbit appeared in Russia and the Ukraine and spread throughout the day. It first was found after attacking ...

Read More
Share: