by Greg Scott | Feb 8, 2014 | Cybersecurity
Given the recent security breaches all over the news, what would a good Main Street business security solution look like and how much would it cost? After all, if organizations such as the NSA and large retailers such as Target can’t keep their secrets safe, what...
by Greg Scott | Jan 13, 2014 | Cybersecurity
The sensational IT security stories just seem to keep coming. Consider: Researchers at antivirus companies decoded a mysterious computer virus named Stuxnet, apparently authored by our own NSA and the Israelli government, designed to attack Iran’s nuclear...
by Greg Scott | Dec 24, 2013 | Cybersecurity
If you shopped at Target between 11/27/2013 and 12/15/2013, congratulations. Your credit or debit card info is one of around 40 million up for sale in a thriving underground marketplace complete with wholesalers, distributors, retailers, and easy to use websites. ...
by admin | Nov 26, 2013 | Slice of Life
This story is one example of many for what a dedicated IT professional does to keep current. The story started in April, 2013 when an opportunity to deliver a project based on a software product called RHN Satellite from a company named Red Hat came along. Large...
by admin | Oct 24, 2013 | Technology
My family is OK with health insurance coverage for now and I live in Minnesota, which has its own website for navigating the local healthcare marketplace, so I don’t need to deal with the US healthcare.gov website to find health insurance. But I was curious after...
by admin | Jul 30, 2013 | Cybersecurity, Slice of Life
I woke up today around 4 AM when one of our cats jumped on my stomach. By now, it’s a pounce and jump operation because he knows if I catch him, I’ll throw him across the room and bounce him off a wall. So he pops up from the floor to the window pane, pounces on my...
by admin | May 30, 2013 | Technology
I did a presales call with a small dentist office a few months ago. I have some dentist customers, so I’ve come to understand a little bit about how dentist offices operate. But this office was, well, different. The “server” was really an old, failing Windows XP PC...
by admin | May 13, 2013 | Technology
In part one of our computer detective saga, the story opened with a few users unable to access their emails. Similar to a Hollywood detective story, we followed the clues through several unexpected twists and turns, with each clue answering questions and generating...
by Greg Scott | Apr 27, 2013 | Technology
(Originally posted April 27, 2013 on my Infrasupport website when I was an independent IT consultant. I copied here and back-dated to match the original posting date.) I spent an awful day yesterday with Microsoft Office 2013 Home and Business Edition. Full...
by admin | Apr 7, 2013 | Cybersecurity, Slice of Life
(Originally published on my Infrasupport blog on April 7, 2013. I back-dated the posting here.) This story is personal. It is one of the best examples I’ve seen where poor IT security practices and the physical world collide and leave a trail of destruction. Way...
Recent Comments