Serving the Greater Albany, Schenectady, Saratoga Region, and beyond 518-414-5005

Blog

Why password security is so important

Sure, it may seem frustrating at times when a website gives you seemingly ridiculous password requirements - "What do you mean I need 27 characters, 18 numbers, 4 symbols and a wingding?!" But believe it or not, there is a very serious security reason behind this. Your password is the first, and often the only, line of defense between your personal or business data and a hacker. In fact, it's surprising just how quickly a simple password (i.e. one that's made up…
Read more

What is a VPN and how can it help your flexible workplace?

A VPN. It's possible you've heard this term before - especially if discussing employees working remotely, disaster recovery plans or even IT hardware like Firewalls. But what actually is a VPN? In short, a VPN or Virtual Private Network is a group of computers and other hardware networked together over a public network (like the internet) using a secure encrypted connection. This group creates a virtual version of a secure, physical network to allow users to easily access applications and share…
Read more

Disaster Recovery – Be Prepared!

If you had to wake up tomorrow and run a 26.2-mile marathon, how would you do? It's doubtful that you'd be able to pull through without months of training, strengthening and drills. Now let's put this in the frame of your business - there's a sudden outage, or a ransomware attack and your files are locked out, or a weather emergency and people can't get to work. What does this mean for your business and the continuation of your service?…
Read more

How ransomware can hold you (and your company) hostage – and what you can do about it

Without a doubt, ransomware is one of the biggest digital security threats facing both home and business computing in recent years, and it's likely a term you've heard cropping up in articles and blog posts throughout the internet. So what is it exactly? Simply put, it's a form of online attack where the attacker, rather than spying on you or trying to get your login information, locks you out from your system and/or files and demands a ransom to allow you to…
Read more