Blog

When Did You Last Discuss Your IT Security Program?

The costs associated with security breaches or failed policies is a hard hitting, costly percentage to the overall success of business. Preventative measures take time, and the programs need to be tailored to the types of interactions those employees will most often come in contact...

Installing Office 365 Mail on Mobile Devices

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" anchor="" in_content_menu="" content_menu_title="" icon_pack="font_awesome" content_menu_fa_icon="" content_menu_fe_icon="arrow_back" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" pattern_background="" section_height="" parallax_speed="" background_color="" border_color="" side_padding="" padding_top="" padding_bottom="" color="" hover_color="" more_button_label="" less_button_label="" button_position="" css_animation="" transition_delay="" el_id=""][vc_column width="1/1"] [/vc_column][/vc_row][vc_row][vc_column width="1/1"][vc_column_text] We've heard from a few clients regarding the necessary...

Windows Users Should Uninstall QuickTime: US-CERT Recommends

The U.S. government has recommended that Windows PC users uninstall Apple Inc's QuickTime video player after security software maker Trend Micro Inc said on Thursday it had discovered two new bugs in the software. Trend Micro said it had uncovered two critical vulnerabilities in the version...

Supporting a Good Cause

  Team BONK Rides the Rockies for Kids   Our leadership at initial.aec values the importance of giving to community organizations that help those in need. Jack Smith, Principal of initial.aec, has taken his passion for cycling and an upcoming opportunity to participate in Ride the Rockies 2016 , as...

P@$$w0rd – Secure?

User Passwords -- especially those not supported by two-step verification -- are your last lines of defense against prying eyes. This guide will help you understand how those passwords are exposed, and what you can do to keep them locked down. How are passwords vulnerable to exposure? Before we...

Ransomeware Taken to a Whole New Level

Locky is the latest ransomware discovered in a string of various attacks on several businesses. As mentioned in the title of the article, this ransomeware goes beyond the typical destruction of user mapped drives, and encrypts data on unmapped network shared files too. Like many...

Help Me Help You

There isn’t one among us interacting with computers on a regular basis who is immune from occasional technical issues that prevent us from getting work completed.  More often than not it certainly seems that these issues arise at the most inopportune time when we're really...

Close Box

Please enter your username or email address.
You will receive a link to reset the password via email.