Techies 4 U Blog

In early 2017, SolarWinds® MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMEs and enterprises, split equally across the US and the UK. Now that the results are in, my anxiety level regarding the state of Internet security has never been higher. I’m also a bit disappointed we (as in the industry) have not made more progress, when it comes to securing our customers. At one moment, our networks are secure because we are patching diligently and then the next day stuff is exploding all around us. Is there really anything we can do? The answer is yes; there is a lot we can do.  Picking through the cyber wreckageThe news of the WannaCry ransomware attacks targeting companies around the world this last weekend is just the latest in a long line of cyber carnage that has been happening. If the past few months are any indicator the damage…

Go beyond the basics of authentication  There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with a finger on some smartphone lock screens; this is also sadly the weakest form of authentication. The knowledge factor relies on something you know, and that's at once its biggest positive and negative.  On the plus side, a user can create (if the login process allows, and all enterprise strength ones should) a truly 'strong' password. I have placed strong within inverted commas for a reason; one person's strength is another's weakness. So, while the user may well think that transposing an “a” for an “@”, and throwing a couple of exclamation marks at their partner's name is strong, a hacker could crack it in less time than it took…

10 Surprising (and Disturbing) Trends Revealed by Google Searches       In the age of Google, it’s not at all surprising to realize that our greatest confidant and holder of our deepest secrets is a simple search bar with a flickering cursor. Free of others’ judgments, we can ask it any question we like, at any time during the day, and get an answer in a fraction of a second. From queries like “What is the meaning of life?” to “What is twerking?” the things we search for on Google speak volumes about the cultural zeitgeist of our times. While this collective consciousness was once the subject of hours of study by philosophers and novelists, today all you need is an Internet connection and a little tool called Google Trends to check our nation’s cultural pulse. At Visme, we got a little curious to see just how much our interests and concerns have…

5 Apps That Will Be Everywhere in 5 Years       So you’re minding your own business one day, talking to a buddy about going to the movies. “Ah, let’s take a cab,” he says. “Do you have Taxidrivr?” Next thing you know, he’s telling you all the marginal advantages it has over Lyft and Uber, how you can choose the preferred odor, talkativeness, and hair style of your driver. You’ve never even heard of it, but then he starts telling you about TixR4Kidz, which lets you buy movie tickets and popcorn before you walk in the theater and even guarantees you a seat not behind Andre the Giant. This app is maybe three weeks old but now your grandmother is using it. Staying hip today is a full-time job. Every month there’s a new app that you gotta have. Some of them fade away, some of them become…

While Vintage is great for the music industry, in IT, it's not the best plan. Lately, hackers have been using passwords stolen from social media accounts years ago to try and access other related social and business accounts. Recent password thefts from Myspace, LinkedIn, and Twitter informed/forced users to change their passwords on those accounts, but what about your other accounts that use the same password? If you were informed of a hack on your account in the past, and you used the same password elsewhere, it's probably a good idea to change that password sooner rather than later. The Best Hack Proof Strategy for your social media accounts is to use Two Factor Authentication (2FA). In its simplest form, 2FA sends a 4- or 6-digit code to your mobile device via SMS that must be entered in as a challenge on the login page after password credentials have been…

New EMV initiative results in stores taking on Fraud liability. Is your Store now liable for credit card fraud? Annual costs of card fraud in the US alone are estimated at $8.6 billion per year and is increasing. Fraud is expected to impact mobile payments as well. Prior to October 2015, for most counterfeit card fraud that occurred at retailers’ in-store locations, liability was with the card issuers. Since October 2015, that liability has shifted to the merchants, in certain cases, unless they have replaced or upgraded their card acceptance and processing systems to use chip-enabled devices and applications to process payment transactions.It’s estimated that 40 percent of the world’s cards and 70 percent of its terminals deployed outside the US are already using the EMV standard. Are you Protected?Find out if you are protected from fraudulent liability today! Call 888-953-9224 today for a free consultation.        …

     

Our Location

Headquarters
9549 N. Royston rd.
Grand Ledge, MI 48837
Get Directions

Refer a friend

Help your friends get the best solution for their IT problems and needs and earn a discount on your next invoice!

Find out more