Blog

bva_blackninja-tealbelt

BVA INC – IT Consulting Blog

Since 1993, BVA has delivered the highest quality in serving the IT consulting needs of small- and medium-sized businesses in Arizona and the greater Phoenix area, supporting them in maximizing the value of their information technology investments. We understand the impact that technology and computer networking services has on your business, and we are committed to your success.

Security Alert – Hide your IP Address

IP address is the identifier that allows information to be sent between devices on a network. It contains location information and makes devices accessible for communication. IP addresses are mathematically assigned by the Internet Assigned Names Authority (bet you didn’t know that!). This might be fine and dandy news for

A Steal of a Deal- Latitude 13 7000 Series 2-in-1

 

 
At $599, this 2-in-1 combines a laptop and tablet in perfect harmony. Whether it be business needs, student work, or basic computing, a 2-in-1 is the ultimate solution. Be free to switch between typing on a keyboard, and writing with a tablet, without the need for multiple devices. Superior performance

Google Fiber seeks to test Super Fast Wireless

In 12 major cities, Google is planning to rely on wireless technology rather than fiber-optic cables, and requesting permission to test wireless in 24 U.S. cities. Google parent company, Alphabet, has also suspended Google Fiber gigabit speed projects in San Jose, California and Portland.
As of right now, Google Fiber has

Cerber Ransomware – Business Model for Extortion

Cerber ransomware earned close to $200,000 in July alone, despite a payment rate of 0.3 percent (not even 1 percent!), due to its affiliate distribution model, according to Check Point Software technologies Ltd.and IntSights Cyber Intelligence.
If this rate were to continue, without increasing, that would mean a $2.3 million payout

Protect your HR department against Cyber Attack

Human Resources is often the target of malicious attacks via hackers and fraudulent email, simply because of the wealth of information available in your HR department. Employee names, birth dates, Social Security numbers, W2 forms and addresses will snag a high price tag on the dark net. The most common

Undetected Hacker Group Spying Since 2011…

Strider hackers reference the all-seeing eye of Sauron in their ‘nation-state level’ malware, which has been used to steal files from organisations across the globe. Unknown hacker group, ‘Strider’, has just been discovered by cyber-security researchers at Symantec. Strider hackers are referencing the all-seeing eye of Sauron in the groups