Blog

Safe Email Practices

Safe Email Practices

Why?

Unsafe computing can corrupt your files, expose the contents of your internal drive to strangers, cause other computers to become compromised, and even allow your computer to be used by spammers to send millions of unsolicited emails.

How to safely get rid of old devices

Mobile devices, such as smartphones, smartwatches, and tablets, continue to advance and innovate at an astonishing rate. As a result, some people replace their mobile devices as often as every year. Unfortunately, too many people dispose of their devices with little thought on just how much personal data is on them.

Why did the internet go down in October?

Why did the internet go down in October?

Last month, a malicious person or group took down numerous popular websites in a massive distributed denial-of-service (DDoS) attack against the domain name service provider Dyn. DDoS attacks are neither new nor very sophisticated.

Swift Chip in the news!

The Ventura County Star ran a short piece about our new Information Security offerings:

http://www.vcstar.com/business/staffing-changes-honors-and-other-business-new-announced-3a402f0d-f933-2367-e053-0100007f2f03-390489991.html

Should you upgrade to Windows 10?

Tech Today with Ken May

Should you upgrade to Windows 10?

Windows 10 was officially released back in July, and many of you are probably wondering if you should do the upgrade. Particularly compelling this time around is that fact Microsoft is offering the upgrade free for the first year that it’s available.

Four leaders in the Ransomeware game

You’ve heard of CryptoLocker, right? Sure, it’s the media favorite, but there are a lot of other players these days that are worth more than an honorable mention. As an MSP, we know how important it is to stay current on the sheer breadth and depth of these types of threats—not to mention their individual characteristics—in order to keep clients protected.

How to fire your IT Guy

This month’s column is a joint article between Ken May of Swift Chip and John Troxel of Verdict Resources, Inc. (http://verdict.net)

 

We’ve all experienced a major IT issue that impacted our business, and they’re a pain.  We can safely say that it is worth $500 or more to ensure we don’t have THAT happen again.

You’ve Probably Been hacked

Another day, another data breach! The same hacker who was selling the data of more than 164 million LinkedIn users last week now claims to have 360 million emails and passwords of MySpace users, which would be one of the largest leaks of passwords ever.

Get that data under control!

Tech Today with Ken May

Get that data under control!

As each New Year comes, technology marches on. Every year, bandwidth goes up, and so does our data usage! I think at this point, most people are aware that they have a limited amount of data included in their data plan before overage fees kick in.

Tesla Announces Powerwall

Tech today with Ken May

On March 31st, 2015, Southern California based electric automobile maker Tesla announced an interesting new product, named “Powerwall.” This is, essentially, a lithium-ion battery that goes on either the inside or outside of your wall.