Learn how to protect yourself from one of the most dangerous cyber threats to date — phishing.
What are the signs of a computer virus infection? How do you get a computer virus? These questions and more are answered by computer repair expert, Ken Palmer.
Many IT headaches can be avoided by outsourcing your IT management needs. It's not for everyone, however. Learn if its right for you.
A "free WiFi" connection can be a traveler's best friend, but can soon become your device's worst nightmare. Learn how to stay safe.
Despite their efforts to protect data, many organizations fail to protect one vulnerability found in every office: the humble office printer.
Before you go to adopt that shiny new piece of business technology, ask yourself these five questions.
Data breaches can wreak havoc on businesses—not only in the price to fix them, but what they do to their image among customers. As we prepare for the release of the 2020 Ponemon Institute Data Breach
Your system going down is not only annoying, but also tremendously expensive. Learn how much money you're likely losing due to IT downtime.
Gather around and hear the tale of printer that cost one healthcare organization over $1 million...and how to avoid such a mess yourself.
If you ever thought that cyber security threats wouldn't waste their time with construction companies, unfortunately, you're dead wrong.
Few other industries have been impacted by cyber attacks than the trucking industry. Learn what efforts are underway to combat these attacks.
Instead of a complex heist, what if the plot of Oceans 11 involved a very manual brute force attack of the Bellagio's Employee's Only area?
Ready for your company's pen test? No? Ever better. Learn why you can't afford not to have a pen test for your business systems.
Check out these five network considerations that you may not have even thought to think about.
New devices, systems, patches, oh my. It's a lot to take in for an IT analyst. There are times when they could use help.
Are you a chronic social media oversharer? The details you provide may be putting your private info or even company data at risk.
How would you feel if you logged in to find all of your files held for ransom? That's what happened to hundreds of dental offices.
It's not just the largest companies that are at risk against cyber threats. Fortunately, there are SMB Electronic Content Management services available.
For workers on the go, laptops are a blessing. For data security specialists, they can be a curse.
In this piece, we discuss what data encryption is, how to encrypt data, and how to make it a part of your document management protocol.
Are you still keeping passwords on sticky notes or in Word files? Are you reusing passwords across systems? Get a password manager already.
Some websites are pits of productivity quick sand. Explore the worst offenders and learn how to block sites without seeming like a jerk.
A vCIO fills in the technology gap between a technician and a full-time director...and then some.
Apple computers and the iOS system have taken the world by storm...but you don’t hear about them being “virus-proof” nearly as much anymore. Why is that?
Learn what spear phishing is, how it differs from regular phishing, and how to protect yourself against a spear phishing attack.
Discover the capabilities of a data lake and why you may or may not want to utilize one for your business.
If you're doing business on the go, you may be letting third-parties see sensitive company data. Put a stop to it with a virtual private network (VPN).
Your company's data could be like a grand piano rolling towards the edge of the loading dock.
What is the difference between "http://" and "https://" and why does an SSL certification matter? In this piece, we'll answer these questions and more.
Thanks to the advent of high-speed Internet, we can remotely monitor computers anywhere in the world. We use this set of automated tools as part of our managed network services. Instead of dispatching
Every day, businesses deal with confidential data containing everything from company trade secrets and marketing research, to social security numbers and addresses of employees. Recent news headlines
What should be considered as the best practice when it comes to creating a secure password? Password security experts weigh in.
All client names have been changed due to confidentiality agreements.The concept of core competencies was introduced in 1990 in a Harvard Business Review article. This new management tactic preach
All client names have been changed due to confidentiality agreements.While JD Young certainly has the ability to act as a company’s primary IT provider, we also have the ability to come alongside
Today we come across a tale of a lone man desperately seeking a Wi-Fi connection, only to be foiled by a chance encounter with a coworker. Will his quest end in success or will he be left in the doldr
The cloud has allowed companies to expand their services and offerings without having to invest in a costly onsite server system. While this is a great opportunity for those who take advantage of the
The WannaCry VirusOver the weekend, the world experienced one of the most severe ransomware outbreaks (named WannaCry) in history, with businesses of all sizes in over 150 countries impacted. Most n
If you understand the risks, create a recovery solution, and constantly test, adapt, and evolve, you can be ready when disaster strikes.
The significance of IT security can’t be exaggerated, and it’s vital that every company take steps to defend against attack. Being familiar with the three primary kinds of IT security will help you ma
The dawn of the digital age as brought about many conveniences we all enjoy every day. On the other hand, it has made us all vulnerable to cyber-attacks and hacks. With devious entities blasting virus
Proactive is always better than reactive, and that goes double for IT risk management. With 55 percent of small-medium sized businesses experiencing a cyber attack in the past year, and 50 percent exp