Posts

,

3 Ways Data Encryption Can Save You From Unnecessary Stress, Spending & Headaches

Data Encryption Protection PII

When you think of data encryption, you might imagine top-secret files and espionage. Historically, militaries and governments protected messages and sensitive information using encryption. These days encryption has many more uses and with hackers and cyber criminals constantly after your data, it is important that you make use of this security measure.

Read more
,

Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled

Google Location History - IT Networks - Big Brother is Watching

Internet privacy is a touchy subject these days. With more and more connected devices in our homes and businesses, it is important that you know what settings allow in terms of data collection and your privacy. Google Location History is an interesting application that tracks your movement throughout the day. It is benign enough but you wouldn’t believe how closely this app can track your movements. Read on to get a look at how it works and also some instructions on how to enable it if you choose.

Read more
,

5 Critical Components Any Professional Disaster Recovery Plan Must Have

Disaster Recovery Plan IT

If you are in business, you have most likely considered what you might do if a disaster hit. Disaster happens. Theft, hardware failure, ransomware and other viruses, even natural disasters . . . Disaster recovery and business continuity must be things you have planned for the safety of your business, your employees and your reputation. When considering a proper and professional disaster recovery plan, many variables need consideration. Read on for our 5 Critical Components Any Professional Disaster Recovery Plan Must Have.

Read more
,

3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It

wannacry ransomware prevention

How confident are you in your cyber security protocols? If you got hit by ransomware today, would you know how to get yourself back up and running without paying the cyber criminals a dime? Do you have an IT partner who can visualize your server real time so you don’t lose time and money during a disaster? These are all questions you should have answers to and part of a larger conversation about proper cyber security preventions. Read on to learn more about one of the most recent cyber security attacks – WannaCry – and what you need to do to protect your business.

Read more
,

Why Good Camera Systems Need Great IT Pros

security cameras design, intstallation and security integration

You’ve heard many horror stories about viruses and ransomware by now. But, have you heard about what malware and hackers can do to your camera system if you aren’t careful? Off brand security systems may appear attractive with their off brand price points, but can you afford your cameras leaking critical and confidential footage/data? We didn’t think so, read on for some information on why a good camera system needs a great IT pro.

Read more
,

Don’t Use Public WiFi Without Reading These Data Security Quick Tips

public wifi is dangerous for data security

We’ve all done it. Signed into the public WiFi at a restaurant or coffee shop. Being connected has become a commodity these days and hackers are just waiting to take advantage of you and your data. This month we dive into a few quick tips to secure your mobile devices and laptops from outside intruders when working on the road or connecting to a free hotspot.

Read more
,

Stop These 3 Hazardous File Sharing Habits Yesterday!

file sharing tips with ATS IT Managed Services

If you are in business, you have file sharing needs as well as habits. This activity comes with its own risks though and it is important to protect yourself when it comes to sharing files both internally and externally in business. Read on for 3 hazardous file sharing habits you have to stop yesterday!

Read more