Get important IT insights and trends from our team of pros each month. Sign up.
The End Is Near Here for Microsoft Office 2010
If your business is still running some Microsoft 2010 software, the end is here. Microsoft will no longer support Office 2010 as of October 13, 2020 and is ending support for SharePoint 2010 and Project Server 2010 after April 13, 2021. But don’t panic. You’re Not Alone Business leaders are sometimes surprised to hear that…
Read MoreNot Able To Text or Make Calls? It Could be SIM Hijacking
If your phone suddenly loses the ability to place calls or send and receive texts, you may be victim of a cyber crime. Whether you call it SIM hijacking, SIM jacking (simjacking) or SIM swapping, it’s on the rise. And it gives cyber criminals the chance to drain your bank account, access PHI on your…
Read MoreMulti-Factor Authentication: Your Best Defense Against Social Engineering
Social engineering and multi-factor authentication may sound like terms from a dystopian novel, but they’re actually what’s bad and good in the world of cyber security. Bad News: Social Engineering Social engineering is the practice of tricking people into taking actions that give cyber criminals access to systems and data. Think of well-crafted emails that…
Read MorePreventing A Data Breach: What Businesses Should Learn From Cooke County, TX
The thing about the Cooke County, Texas, cyber attack is that it was a ransomware attack AND a data breach. In fact, these two things go hand in hand more often than not. Understanding that is key to creating the long term cyber security practices you need to keep your business safe. In Case You…
Read MoreDon’t Be That Guy: Ransomware Prevention In 2020
The recent cyber attack on Garmin highlights the severity of ransomware. It’s also bewildering: After all, there’s just no excuse for being victimized by a ransomware attack anymore. Here are the critical elements of today’s ransomware prevention. End-user Training Many ransomware attacks occur because system users unwittingly allow criminals to enter their networks. An employee…
Read MoreIn-house or Outsourced IT Services? That’s Easy
Small business owners see life through dollar-sign glasses. They just can’t help envisioning money spent everywhere they look in their companies. Money is always top of mind, especially when deciding between in-house or outsourced IT services. Spoiler alert: There really is no comparison. Most companies save money by outsourcing IT. Would you come out ahead…
Read MoreHow to Spot a Phishing Email
Can You Spot a Phishing Email? If you know what to look for, phishing emails are easy to spot. Even though phishing scams are always evolving, knowing just the basics can help you with identifying potentially malicious emails. Scammers use common forms of communication to maximize the reach of their scams — and so far,…
Read MoreAnnouncement: Aeko Technologies Launches New Website
Announcement: Aeko Technologies Launches New Website to Help More Dallas Fort Worth Companies Leverage Technology and Take Flight Fort Worth, TX (August 7, 2020) – We are pleased to launch our new Aeko Technologies website to better serve our current and future clients. With a fresh new user experience, our new website now offers visitors…
Read More