Techies 4 U Blog

In early 2017, SolarWinds® MSP investigated the cybersecurity preparedness, experiences, and failings of 400 SMEs and enterprises, split equally across the US and the UK. Now that the results are in, my anxiety level regarding the state of Internet security has never been higher. I’m also a bit disappointed we (as in the industry) have not made more progress, when it comes to securing our customers. At one moment, our networks are secure because we are patching diligently and then the next day stuff is exploding all around us. Is there really anything we can do? The answer is yes; there is a lot we can do.  Picking through the cyber wreckageThe news of the WannaCry ransomware attacks targeting companies around the world this last weekend is just the latest in a long line of cyber carnage that has been happening. If the past few months are any indicator the damage…

Go beyond the basics of authentication  There are, simply put, three generally accepted methods of authenticating identity: knowledge; possession; and inherence. The first is familiar to everyone in the form of the password, passphrase, PIN, or even the pattern drawn with a finger on some smartphone lock screens; this is also sadly the weakest form of authentication. The knowledge factor relies on something you know, and that's at once its biggest positive and negative.  On the plus side, a user can create (if the login process allows, and all enterprise strength ones should) a truly 'strong' password. I have placed strong within inverted commas for a reason; one person's strength is another's weakness. So, while the user may well think that transposing an “a” for an “@”, and throwing a couple of exclamation marks at their partner's name is strong, a hacker could crack it in less time than it took…

10 Surprising (and Disturbing) Trends Revealed by Google Searches       In the age of Google, it’s not at all surprising to realize that our greatest confidant and holder of our deepest secrets is a simple search bar with a flickering cursor. Free of others’ judgments, we can ask it any question we like, at any time during the day, and get an answer in a fraction of a second. From queries like “What is the meaning of life?” to “What is twerking?” the things we search for on Google speak volumes about the cultural zeitgeist of our times. While this collective consciousness was once the subject of hours of study by philosophers and novelists, today all you need is an Internet connection and a little tool called Google Trends to check our nation’s cultural pulse. At Visme, we got a little curious to see just how much our interests and concerns have…

5 Apps That Will Be Everywhere in 5 Years       So you’re minding your own business one day, talking to a buddy about going to the movies. “Ah, let’s take a cab,” he says. “Do you have Taxidrivr?” Next thing you know, he’s telling you all the marginal advantages it has over Lyft and Uber, how you can choose the preferred odor, talkativeness, and hair style of your driver. You’ve never even heard of it, but then he starts telling you about TixR4Kidz, which lets you buy movie tickets and popcorn before you walk in the theater and even guarantees you a seat not behind Andre the Giant. This app is maybe three weeks old but now your grandmother is using it. Staying hip today is a full-time job. Every month there’s a new app that you gotta have. Some of them fade away, some of them become…

While Vintage is great for the music industry, in IT, it's not the best plan. Lately, hackers have been using passwords stolen from social media accounts years ago to try and access other related social and business accounts. Recent password thefts from Myspace, LinkedIn, and Twitter informed/forced users to change their passwords on those accounts, but what about your other accounts that use the same password? If you were informed of a hack on your account in the past, and you used the same password elsewhere, it's probably a good idea to change that password sooner rather than later. The Best Hack Proof Strategy for your social media accounts is to use Two Factor Authentication (2FA). In its simplest form, 2FA sends a 4- or 6-digit code to your mobile device via SMS that must be entered in as a challenge on the login page after password credentials have been…

Your website is often customers’ first impression of your small business. Here’s how to make sure it’s a good one.       Your company’s website is like your digital calling card—it could be the first interaction a new customer has with your small business. That’s why it’s worth keeping your website up to date and ensuring it makes the best first impression on prospects. Even if you get some help with your website, here are some important do’s and don’ts for small business owners. Follow these guidelines to put your best foot forward and step up your digital marketing game. Do: Make Your Contact Info Easy to Find Make sure to list your address, phone number and operating hours right on the homepage of your website. The easier it is for customers to call and visit your business, the better. Don’t bury that information on another page of the site. Do:…

     

Latest Blog Post

Our Location

Headquarters
9549 N. Royston rd.
Grand Ledge, MI 48837
Get Directions

Refer a friend

Help your friends get the best solution for their IT problems and needs and earn a discount on your next invoice!

Find out more