The topic of online pornography can be rather uncomfortable to discuss, but it’s an issue that business owners need to be aware of; especially considering that 70 percent of all online porn access happens during business hours! Whoa. This statistic has some naughty implications for what your employees may be doing on company time.
During the broadcast of Super Bowl XLIX, Coca-Cola premiered a bold new commercial meant to inspire viewers, make the world (wide web) a happier place, and of course, sell Coca-Cola. To be sure, it was a monumental marketing effort, but for those of us in IT, we find it cringeworthy and must object to the commercial’s content.
As seen by the recent Superfish app debacle, software that comes preinstalled on a new PC shouldn’t always be trusted. Most of the time, the innate software on a device can be trusted; but the Superfish application is an exception. This app, which came preinstalled on new Lenovo PCs between the months of September and December of 2014, can potentially compromise the security of your machine.
Smartphones may have been some of the first Internet-connected mobile devices, but they are still as vulnerable to attack as ever. This is especially true for those who forsake any sort of mobile device security policy. With modern businesses utilizing mobile devices, it’s more important now than ever before to have solid security practices in place.
When it comes to business communications technology, you don’t want to be caught using technology that’s outdated. Thanks to the innovations afforded to your company by Voice over Internet Protocol (VoIP), you can have access to lots of game-changing telephone features that blow traditional phone systems out of the water. Has your business switched to the VoIP advantage?
There’s no denying that computers have become a central figure in the rapid growth and success of Western culture. With it brings commentary. In the second half of the 20th century and the first decade-and-a-half of the 21st century, humans have turned to the motion picture to tell the stories they deem important and noteworthy. The growth of technology has not only presented us with our new lifestyle, it has virtually erased the lifestyle of our ancestors, and this revelation leads to fear.
We’re all aware of how the proliferation of mobile devices is changing the workplace, but let’s take an objective look at this trend. Are mobile devices changing the workplace for the better? Are employees actually using their personal devices to get more work done? Or, is the BYOD trend a bunch of hype and nothing’s really changed? Let’s find out.
When a hard-working business owner such as yourself gets going, you keep working until you’ve got nothing left to give. This is commonly known as “office burnout,” and isn’t healthy for anyone, or anything; especially your business and office relationships.
Technology has come a long way since 2003. It seems like just yesterday that Microsoft dropped support for Windows XP, and in just a few short months, they’ll be dropping support for Windows Server 2003, as well. If your business is one of the many still utilizing this server operating system, you’ll want to make sure that you upgrade away from it before July 14th, 2015. Otherwise, you’ll be running without security patches or updates.
A couple of big names stand out when it comes to hacking attacks, but the recent Sony hack has really taken the cake. The GOP, who call themselves the “Guardians of Peace,” have exposed a ton of details to the public, including the company’s budget, their plans for layoffs, and 3,800 employee Social Security numbers. Now, they’ve released even more information; this time, it’s leaked personal emails, and judging from the content of them, Sony never wanted them to see the light of day.
What’s the best way to transfer your media files from your Windows PC to your Android mobile device? There are many different ways to go about this. One of the most-efficient-yet-often-neglected ways to sync your music is Windows Media Player.
Are your eyes constantly glued on your email inbox during the workday? It’s not bad to keep up with what’s going on in the office, but a recent study has linked constant email-checking to higher stress levels. This probably isn’t surprising to some, but some folks, like the researchers at the University of British Columbia, claim that there’s a maximum number of times to check your email throughout the day to minimize stress in the workplace.
You always hear about IT professionals discussing the importance of data backup. Why? Because it’s one of the single most-important processes you can integrate into your business continuity plan. While all managed services present a value to your business, only the Backup and Disaster Recovery (BDR) solution is capable of restoring data that has been lost thanks to unexpected hardware failures or natural disasters.
How bad would it have been if we instead entitled this article, “Don’t Let Poor Grammar Effect Your Business?” Even though it would’ve been a clever way to make a point about the perils of using poor grammar in business, there would still be a lot of folks who would spot the mistake and write off our company as incompetent. Herein lies the power of using proper grammar.
We see a lot of password-bashing these days, and some people have lost faith in them as a security measure. But, unfortunately, a lot of the blame for this lies in human memory. We just don’t pick passwords that are strong enough. In fact, a mind-numbing one in 20 people still use “password” to keep their information safe.
Vision Computer Solutions has been made aware of a critical vulnerability in the glibc library by Red Hat Product Security. This vulnerability is affecting many versions of the glibc package, which is one of the most common Linux distributions. Red Hat is stating that GHOST is a 'buffer overflow' bug affecting particular function calls in the glibc library.
If you are running Linux and need support, please contact our office immediately at: (248)349-6115.
Technology is getting more powerful, but have you considered where all of that power comes from? Not many people actually take the time to understand how much energy their PC or workstation is using, but this could potentially be increasing your operating costs higher than they need to. Try taking the time to calculate your PC’s energy usage to get a feel for what your workstation is costing your business and the environment.
A business owner knows better than anyone how difficult it can be to manage their time and get the most out of their workday. However, you can use your morning and afternoon commutes to eliminate certain mundane tasks from your day-to-day schedule. By using this time to your advantage, you can reduce the stress you’re put under on a daily basis and free your schedule for more important tasks.
Most search engines are pretty good at keeping malicious websites out of your search results, but just like any other piece of software on your computer, some search engines do a better job of keeping these threats out of your immediate access. According to TV-Test, a German independent testing lab, there’s a huge difference between the security of the world’s top search engines, like Bing and Google.
Business owners primarily concentrate more on the digital effects of hacking rather than the physical side of it. After all, hacking some code through a network can’t harm you or anybody else in the real world, right? Wrong. As shown by a recent hack in Germany, ignoring network security can be a dangerous gambit.