Tips for Parents New Tech, Who Dis? If the school issues or requires a technology that you and/or your child are not familiar with, explore its features together. Configure the security and privacy settings together immediately. Apply Your Research Apps are a great way for students to learn and apply their knowledge. Before downloading any […]
Blog
Sweet Security
Biometric security? Check. Multiple levels of access control? Check. Redundant power and fiber? Check. Raised floors, fire suppression, tornado proof? Check. What other security features can we offer in our midwest datacenter location? Bees! Don’t worry, you won’t have to fight your way through a swarm of bees to access your data, but ITS President Joel Althoff is adding […]
Ransomware
Locky. CryptoLocker. CryptoWall. Many names and variants exist for 2016’s biggest threat to IT security and productivity, but the outcome is extremely predictable. A user clicks a link in an email, opens an infected email attachment, or visits an infected website, and unknowingly invites the ransomware malware to encrypt files on their machine. If the […]
Hijacked
Chances are good that you, or a coworker, have encountered a browser message that caused quite a panic. It may have said: WARNING! YOUR COMPUTER MAY BE INFECTED! System detected potentially malicious viruses. To Remove Viruses, Call Tech Support Online Now: ############. The message also shows my IP address and service provider information or, Your device […]
Monthly Network Reports
It’s the 1st of the Month; for many ITS clients, that means monthly network usage reports are available from Meraki firewalls, switches and wireless access points. While this data is available at any time from the Meraki dashboard, it’s also nice to receive the month-at-a-glance reports in your inbox. The reports often initiate conversations about […]