Zero-day exploits and vulnerabilities are attacks on computers and networks that happen the same day (day zero) as the vendor becomes aware of the security issue. The latest zero-day attack to hit the news is an Adobe Flash vulnerability (2/1/18). The exploit appears to be distributed through a Microsoft Excel document, with the malicious Flash […]
Worker Flexibility
A recent survey by Citrix, our cloud app-hosting software vendor, collected data regarding employee satisfaction and productivity in relation to workspace flexibility. The survey relayed that office professionals who do not have a flexible work environment believe their companies would introduce flexibility if they had the technological capabilities to accommodate it. How can those companies […]
Digital Signage
A client stopped by our office this week for some IT support, and looking up at our wall of TVs above our cubicles said, “What’s that? The stock market?” He was pointing to our Internet graph, the third in a series of digital displays that monitors key functions at ITS. At a glance from […]
Should I Enforce SSL Decryption On My Network?
Encrypted traffic, or SSL, looks to a firewall just like a random series of bits and bytes. Encryption is good in many situations, because it can hide sensitive data from hackers and ensure privacy for corporate files. However, encryption technology can also be used by cybercriminals as an effective method to hide malware, ransomware, rogue […]
Ring Central mobile client license policy
We have recently received frantic calls from current Ring Central users, upset with the additional cost associated with a mobile client license. While Ring Central maintains that this cost has always been part of their contract, users are confused. Current Ring Central users that call to inquire about VoIP options are calling to specifically inquire […]