Data Recovery

How to scrub data from your device

You may be surprised to hear that “Delete” is not an end all function for wiping data clean from your machine. To ensure you data doesn’t get into the wrong hands, perform a secure erase. Whet...

Lost all your emails in Outlook 2011 for Mac? Not a problem!!

Accidentally deleted everything in your Outlook 2011 email inbox on an Apple Mac? Not to worry, one of our lead techs stumbled upon this quick fix! Deleting items such as emails and contact list entries means t...

How to Ensure Company Data Does Not Leave with Employees

More often than not when an employee leaves an organization, they take company data with them. Some may not even realize they still have access to the data, and others may never do anything malicious with the d...

5 New Tech Tested Products for Your Business

Ever wondered what the best in tech products are at this very moment? The experts at Network World weigh in and give us a little glimpse of the newest innovations on the market. Vidder PrecisionAccess – B...

Storage and Backup Products that Save the Day

Nasuni Cloud Storage – Leveraging the cloud as a primary storage component, Nasumi Cloud NAS combines local storage controllers and cloud storage to provide global access to data with local performance. T...

Ransomware Attacked My Mom’s Computer

How My Mom Got Hacked, a real life story about Brooklyn artist who receives a panicked phone call from her mom one day complaining her personal computer has been taken over by some sort of strange encryption. T...

Ransomware seeks victims via TeamViewer

Anyone use Teamviewer? If so, sorry to say,  you may have been hacked. A new ransomware has been discovered appending the .surprise extension to encrypt important files. Further research into the extension reve...

Ransomware

  Ransomware is the devilish and extremely debilitating program designed to lock and encrypt files in order to extort money from consumers, business owners, and even government officials. It seems that no ...

Cyber Security Threats – Proactive Rather Than Reactive

Security executives have increasingly urged firms to utilize prevention, encouraging a plan that encompasses Information Technology and business units in order to ensure cyber security. Why might you ask? As a ...

Easy Reinstall – Windows 8

Windows 8 – Easy Reinstall Reinstalling Windows used to be a pain because you had to find all your cd’s, dvd’s, product keys and whatever backups you have of your software and or data. Simply...