Blog

bva_blackninja-tealbelt

BVA INC – IT Consulting Blog

Since 1993, BVA has delivered the highest quality in serving the IT consulting needs of small- and medium-sized businesses in Arizona and the greater Phoenix area, supporting them in maximizing the value of their information technology investments. We understand the impact that technology and computer networking services has on your business, and we are committed to your success.

Security is Build in Different Layers

Network and Computer Security is build in different layers of solutions to ensure you are truly protected. Too often I walk into meetings with CEO/CFO’s that claim they are secure due to being on a single security platform of products. Of course all of this is in a single interface

Dangerous USB Cable – Hacker Tool

Some hackers are getting creative in getting into people’s system by leveraging USB cables that have a Wifi Card in them which hallway the hacker the ability to access remotely and be in your local system.  Once in the hacker can browse the network and servers at their leisure to

50 Arizona Local Businesses Breached

Restaurants groups really need to get their technology together and secure their environments.  A data breach may have compromised the personal information of customers who patronized any of 50 Arizona businesses last month.  This affected certain restaurants and hotels between Jan. 3 and Jan. 24.  This affected businesses such as Chompie’s, Someburros,

Apple

Apple jams Facebook’s web-tracking tools

“We’re shutting that down,” declared Apple’s software chief Craig Federighi, at the firm’s developers conference.

He added that the web browser Safari would ask owners’ permission before allowing the social network to monitor their activity.

The move is likely to add to tensions between the two companies.

Apple’s chief executive Tim Cook had

Cost of Free Downloads: Sinister Bug Found in uTorrent Apps

A critical vulnerability has been detected in two versions of uTorrent, which is one of the Internet’s most widely used BitTorrent apps. Gaps in the system were discovered by Google Project Zero. According to experts, the vulnerability allows hackers to gain access to downloaded files and download history.

The biggest threat is by malicious sites that could

Best Laptops of 2018

The Best Laptops of 2018

The Lay of the Laptop Land

The market has undergone major changes in the past few years, and there’s likely to be more confusion in the notebook aisle now than at any other time. Today’s models encompass everything from featherweight, business-savvy ultraportables that barely tip the scales at less than 2