4 Benefits of Separate Administrator Accounts

The practice of using separate administrator accounts involves limiting certain privileges to a select group of users. These users are the system administrators, and they keep the system running properly. Administrator privileges include application installation and the ability to work with files that are inaccessible to regular users. Here are a few reasons for restricting these privileges to only a …

How Hackers Can Use Your Employees to Gain Confidential Data

We sometimes think of hackers as geeky types spinning threads of arcane code to gain access to an organization’s innermost secrets, and to some extent, that’s true. What’s surprising is that an almost equally effective tactic hackers use for obtaining such information is to come right out and ask for it. According to a 2014 study sponsored by the Carnegie …

How to Personalize Windows 8.1

Upon its release, Windows 8 proved controversial. Desktop and laptop users lamented the disappearance of the Start menu and disliked the new touchscreen-orientated interface. However, Windows 8.1 introduced a host of changes, including several new personalization options. Let’s take a look at some of these changes and explain how to get the most out of them. Changing the Start Screen …

5 Signs Your Hard Drive is About to Fail

Whether you have a solid state or mechanical drive there is always a chance the device will fail. Regardless of the type of drive, your computer usually will show subtle signs of a pending disk failure. Paying attention to these signs can save you from unexpectedly losing the data stored on your drive. 1. Intermittent File Corruption or Missing Files …

What Healthcare Professionals Need to Know About Protecting Their Digital Records

For healthcare professionals, understanding the relevant legislation can be a daunting task. They must learn how to adapt to changes in the world or face stiff fines and other penalties. This is especially true in the field of digital information management. In 1996, then-US President Bill Clinton signed into law the Health Insurance Portability and Accountability (HIPAA) Act. The first …

Top 5 IT Security Best Practices

The medical, legal, and accounting industries are well known for taking the privacy of their clients seriously. However, this issue is important for nearly every type of business. In light of several recent cyber attacks, IT security has been highlighted as a vital component of any successful organization. With that in mind, here are several best practices that companies can …

CryptoWall: The Latest in Ransomware and Cyber Crime

Over the last year, authorities have been fighting a series of ransomware viruses — first CryptoLocker, then CryptoDefense, and now Cryptowall. CryptoLocker infected over 500,000 computers and although only 1.3% of the victims paid the ransom, the criminals are believed to have made about $3 million dollars. In June 2014, the US Justice Department began a multinational campaign to eradicate …

What Are The Best Alternatives To Windows Server 2003?

The big news in the tech press now is the end of life for Windows XP. Less publicized, but probably far more important to the operation of many small businesses is the end of life for Windows Server 2003, which happens on July 14, 2015. While that date may seem comfortably distant, transitioning a business server can be much more …

New Report Shows Software is Becoming Increasingly Vulnerable

You don’t have to be an IT manager to notice that cybersecurity threats are all over the news lately. Simply using software from some of the most popular and trusted brands in the marketplace can expose your company to a host of problems: malware, security risks, vulnerabilities, and spam. For today’s business owners, protecting their bottom line includes protecting against …