Security Audits

We offer security audits to fit the needs of the home / small office / home office client. We can come in and perform an audit for you, explain the areas of concern, and present a plan to address those […]

Read More

WPA2 Wi Fi Vulnerbility

The flaw, known as KRACK, affects WPA2, a security protocol widely used in most modern Wi-Fi devices. In some cases, a hacker could exploit KRACK to inject malware such as ransomware into websites, according to KU Leuven’s Mathy Vanhoef, the researcher who discovered the […]

Read More

IT Sites that We Like!

Supplemental IT Resources Version: 2016.03.10 Compiled by: Jeremy Leik Table of Contents   General Resources Yahoo start your own computer business group https://groups.yahoo.com/neo/groups/computerbusiness/info Yahoo computer technicians group https://groups.yahoo.com/neo/groups/computertechpros/info Solo Tech Pros http://solotechpros.com/ Technibble Surplus Servers (off-lease refurbished) http://unixsurplus.com/ Surplus Servers […]

Read More

Home