What are the signs of a computer virus infection? How do you get a computer virus? These questions and more are answered by computer repair expert, Ken Palmer.
Many IT headaches can be avoided by outsourcing your IT management needs. It's not for everyone, however. Learn if its right for you.
A "free WiFi" connection can be a traveler's best friend, but can soon become your device's worst nightmare. Learn how to stay safe.
Using a VPN is always a great idea, but there are reasons besides the most obvious. Learn some less obvious reasons why to use a VPN for ECM.
Data breaches can wreak havoc on businesses—not only in the price to fix them, but what they do to their image among customers. As we prepare for the release of the 2020 Ponemon Institute Data Breach
Regardless of the nature of the problem, data leaks can be devastating to businesses. Here are some key findings that show just how harmful data leaks are.
Gather around and hear the tale of printer that cost one healthcare organization over $1 million...and how to avoid such a mess yourself.
Enjoy this overview of the recommended tools, equipment, practices, and services for optimal remote working environments for your team members.
Few other industries have been impacted by cyber attacks than the trucking industry. Learn what efforts are underway to combat these attacks.
Ready for your company's pen test? No? Ever better. Learn why you can't afford not to have a pen test for your business systems.
Going to the gym and reading more books are great, but how about the new years resolution to strengthen your passwords? More ideas here!
New devices, systems, patches, oh my. It's a lot to take in for an IT analyst. There are times when they could use help.
Are you ignoring system updates? More than feature updates, these patches can keep your system safe from emerging cybersecurity threats
Two-step authentication is great...until someone steals your phone number. Learn how this happens and how to prevent it.
If you're a designer or engineer, you shouldn't have to spend your time worrying about data security and IT issues.
For workers on the go, laptops are a blessing. For data security specialists, they can be a curse.
About to build a server room for your small business? Here are a few items you'll want to consider.
Are you still keeping passwords on sticky notes or in Word files? Are you reusing passwords across systems? Get a password manager already.
Faxes may feel like an outdated medium, but they are still held up in court more than emails in many instances. But why is this so?
A vCIO fills in the technology gap between a technician and a full-time director...and then some.
Learn what spear phishing is, how it differs from regular phishing, and how to protect yourself against a spear phishing attack.
Have you recently come across an abandoned USB flash drive? Be cautious of plugging that thumb drive into any computer.
If you're doing business on the go, you may be letting third-parties see sensitive company data. Put a stop to it with a virtual private network (VPN).
What is the difference between "http://" and "https://" and why does an SSL certification matter? In this piece, we'll answer these questions and more.
In our hyperconnected age, instituting a robust identity theft prevention protocol is crucial.
Every day, businesses deal with confidential data containing everything from company trade secrets and marketing research, to social security numbers and addresses of employees. Recent news headlines
Being aware of the typical IT mistakes made by other small businesses can help you avoid making them in your small business.
Gather 'round to hear the story of how Managed Network Services helped a nameless company help eliminate technology downtime.
All client names have been changed due to confidentiality agreements.While JD Young certainly has the ability to act as a company’s primary IT provider, we also have the ability to come alongside
All client names have been changed due to confidentiality agreements.Using the friendly neighborhood IT guy is fine when a company is starting out. But when the friendly neighborhood IT guy sets u
The cloud has allowed companies to expand their services and offerings without having to invest in a costly onsite server system. While this is a great opportunity for those who take advantage of the
Mobile security is vital to any business that wants to reduce the risk of unwanted access to their sensitive information.
If you understand the risks, create a recovery solution, and constantly test, adapt, and evolve, you can be ready when disaster strikes.
The cloud has been an IT buzzword for a long time now, but a lot of people still don’t fully understand what the cloud is, or how it can be used to help their company.Official Definition- If you G
The significance of IT security can’t be exaggerated, and it’s vital that every company take steps to defend against attack. Being familiar with the three primary kinds of IT security will help you ma
We all know not to download files attached in emails from strangers. The problem is that hackers know we know better and are finding new ways to cause trouble. The newest trick is called Business Emai
Proactive is always better than reactive, and that goes double for IT risk management. With 55 percent of small-medium sized businesses experiencing a cyber attack in the past year, and 50 percent exp