Blog
BYOD (Bring Your Own Device)
By Christopher George Android, bring your own device, byod, iPhone
BYOD (Bring your own device) is an emerging trend in today’s workplace. Allowing employees the freedom to choose the devices they want to use to consume and interact with information goes a long way in boosting productivity, cost savings and morale. However, it’s not without its challenges. One of the big challenges is controlling access, specifically wireless access of all individual devices on your corporate network. Challenges with managing a traditional wireless network include:
Increasing Spam/Malware Mischief
By Christopher George attachment
As you have probably seen, there has been an increase in the attempts of spammers to entice you and your staff into downloading malicious files. This has come across most recently as emails from financial institutions, payroll providers, and other businesses asking you to download a file from Dropbox. These legitimate businesses would not deliver documents to you via Dropbox, nor any other file sharing cloud service. Here is an example of this type of malicious email: The best defense to this...
Security survey enlightening … and frightening
By Christopher George attack, cyber
Survey says? A recent survey of 4,275 global IT security pros was both enlightening … and frightening. Consider the findings of the survey: 57 percent: Felt their organizations were unprotected from sophisticated cyberattacks. 63 percent: Doubted they could stop the exfiltration of confidential information from their systems. 69 percent: Said cyberthreats were falling through the cracks in their systems. 44 percent: Had experienced one or more substantial cyberattacks in the last year. 59...
Windows XP not “dead&” yet; Microsoft makes exception with emergency update for IE
Microsoft earlier this month provided an emergency security update for Internet Explorer to prevent hackers from continuing to do their dirty work. But that wasn’t the big news. In a surprise move, Microsoft allowed Windows XP machines to receive the update, even though Microsoft had indicated in April it considered the 13-year-old operating system retired. “Even though Windows XP is no longer supported by Microsoft and is past the time we normally provide security updates, we’ve decided to...
Hackers targeting a newly discovered flaw in Microsoft Internet Explorer
By Christopher George flaw, hackers, IT
Hackers around the globe are already exploiting this new flaw, affecting the popular Internet Explorer versions 6 through 11. The flaw relies on a well-known flash exploitation used to bypass Windows security protection. Once the hacker is in, they can install malicious software without your knowledge. Microsoft is currently investigating this flaw and we would quickly expect more information on a fix/patch, due to its large risk profile. For more information on the flaw and recommended...
Aftermath of Heartbleed Bug
By Christopher George bug, hackers
In the aftermath of this month’s bug “Heartbleed,” security experts say there is little Internet users can do to protect themselves from this month’s recent discovery of the “Heartbleed” bug that exposes data to hackers. It is all up to website operators to fix, not website users. Researchers have observed advanced hacking groups conducting automated scans of the internet in search of Web servers running a widely used Web encryption program knows as OpenSSL that makes them vulnerable to the...
Check out Protelligent’s New Website
Protelligent has launched its new website, protelligent.net, premiering new user-friendly features, streamlined content, and a more accessible format for all. “Protelligent’s new website is designed with customers’ needs in mind,” said CEO Christopher George. “Customers can access a remote support feature directly from the website that ensures rapid response and issue remediation for the end-users we support. Website visitors will enjoy the original blog content, real-time industry alerts,...
Is your technology environment protected?
By Christopher George Business Continuity
You need to evaluate your business’ security posture, and make informed, balanced decisions about protecting yourself from threats to your business. Reduce your risk and achieve Zen for your business with the following safeguards:
Cloud Computing Isn’t Just Technology – It’s Strategy
By Christopher George Cloud, cloud computing, datacenter
The term “cloud computing” is everywhere but what does it mean? Over the last few years, the concept of the cloud has come to mean different things to different people. Let’s start with the basics. What is cloud computing? The cloud is a source of highly scalable services that can be accessed on-demand over the Internet. Simply put, cloud computing introduces new and better kinds of services and connections, and decreases costs associated with technology infrastructure and personnel. How is...
Giving Back to our Community
By Christopher George Community, Giving Back, IT
Protelligent’s recent expansion to Spokane, Washington was a success. Christopher George, CEO of Protelligent, personally thanks the community for the inviting welcome. The Protelligent team is looking forward to the future and being involved with a closely connected community. To share in the support of the community, Protelligent made a generous contribution to a local charity, Vanessa Behan Crisis Nursery which helps keep children safe by providing immediate refuge and ongoing family support.
Recent Posts
Archives
- August 2020 (1)
- July 2020 (1)
- June 2020 (1)
- May 2020 (1)
- April 2020 (1)
- March 2020 (1)
- February 2020 (1)
- January 2020 (1)
- December 2019 (1)
- November 2019 (1)
- October 2019 (1)
- September 2019 (2)
- July 2019 (1)
- June 2019 (3)
- April 2019 (1)
- March 2019 (1)
- February 2019 (1)
- January 2019 (1)
- December 2018 (1)
- November 2018 (1)
- October 2018 (1)
- September 2018 (1)
- August 2018 (1)
- May 2018 (1)
- March 2018 (1)
- February 2018 (1)
- January 2018 (2)
- December 2017 (2)
- November 2017 (3)
- October 2017 (3)
- September 2017 (2)
- August 2017 (3)
- July 2017 (2)
- June 2017 (5)
- May 2017 (7)
- April 2017 (5)
- March 2017 (5)
- February 2017 (1)
- January 2017 (5)
- December 2016 (1)
- October 2016 (4)
- September 2016 (1)
- August 2016 (3)
- July 2016 (1)
- June 2016 (1)
- May 2016 (1)
- April 2016 (1)
- November 2014 (1)
- July 2014 (2)
- June 2014 (1)
- May 2014 (3)
- April 2014 (3)
- March 2014 (1)
- February 2014 (2)
- January 2014 (3)
- December 2013 (1)
- November 2013 (4)
Categories
- Community (19)
- Cloud (18)
- IT (16)
- cloud backup (16)
- cybersecurity (15)
- cloud backup data recovery (9)
- cloud computing (8)
- clouddr (8)
- it security (8)
- cloud storage (7)
- data security (7)
- AWS (6)
- Education (6)
- cloud services (6)
- Giving Back (3)
- cloud restoration (3)
- compliance (3)
- data (3)
- assessment (2)
- business (2)
- chief information officer (2)
- client satisfaction (2)
- cloud data recover (2)
- cloud dr (2)
- critical power exchange (2)
- cyber (2)
- cyber responsibility (2)
- data recover (2)
- datacenter (2)
- duo security (2)
- end-to-end encryption (2)
- hackers (2)
- holiday season (2)
- internet (2)
- storage (2)
- 2019 goals (1)
- Android (1)
- Arts (1)
- Business Continuity (1)
- CASBO (1)
- Cisco Cloud Web Security (1)
- Cisco Security Intelligence Operations (1)
- Custom Design (1)
- Graphics (1)
- Protelligent (1)
- Virus (1)
- account protection (1)
- advanced persistent threats (1)
- alien vault technology (1)
- alienvault technology (1)
- antivirus program (1)
- antivirus software (1)
- apis (1)
- apt (1)
- attachment (1)
- attack (1)
- automatic updates (1)
- awareness (1)
- backup (1)
- benefits (1)
- best practices (1)
- bot-driven attacks (1)
- bring your own device (1)
- bug (1)
- business growth (1)
- byod (1)
- california joint powers insurance authority (1)
- california jpia (1)
- check cashing (1)
- cisco (1)
- cjpia (1)
- client testimonial (1)
- cloud backup vs cloud storage (1)
- cloud computing services (1)
- cloud conversion (1)
- cloud migration (1)
- cloud recovery (1)
- community link consulting (1)
- compliance program (1)
- compliance regulations (1)
- computer science (1)
- computer security (1)
- computers (1)
- contain attacks (1)
- cost of cybercrime (1)
- cost of data breach study (1)
- critical power (1)
- critical power products & services (1)
- customer testimonial (1)
- customer testimonial video (1)
- cyber liability (1)
- cyber-threat (1)
- cybercrimes (1)
- cybercriminals (1)
- cybersecurity program (1)
- data access (1)
- data breach (1)
- data breach protection (1)
- data center (1)
- data encryption (1)