Blog

30
Jun

BYOD (Bring Your Own Device)

BYOD (Bring your own device) is an emerging trend in today’s workplace. Allowing employees the freedom to choose the devices they want to use to consume and interact with information goes a long way in boosting productivity, cost savings and morale. However, it’s not without its challenges. One of the big challenges is controlling access, specifically wireless access of all individual devices on your corporate network. Challenges with managing a traditional wireless network include:

Read more

29
May

Increasing Spam/Malware Mischief

As you have probably seen, there has been an increase in the attempts of spammers to entice you and your staff into downloading malicious files. This has come across most recently as emails from financial institutions, payroll providers, and other businesses asking you to download a file from Dropbox. These legitimate businesses would not deliver documents to you via Dropbox, nor any other file sharing cloud service. Here is an example of this type of malicious email: The best defense to this...

Read more

27
May

Security survey enlightening … and frightening

Survey says? A recent survey of 4,275 global IT security pros was both enlightening … and frightening. Consider the findings of the survey: 57 percent: Felt their organizations were unprotected from sophisticated cyberattacks. 63 percent: Doubted they could stop the exfiltration of confidential information from their systems. 69 percent: Said cyberthreats were falling through the cracks in their systems. 44 percent: Had experienced one or more substantial cyberattacks in the last year. 59...

Read more

27
May

Windows XP not “dead&” yet; Microsoft makes exception with emergency update for IE

Microsoft earlier this month provided an emergency security update for Internet Explorer to prevent hackers from continuing to do their dirty work. But that wasn’t the big news. In a surprise move, Microsoft allowed Windows XP machines to receive the update, even though Microsoft had indicated in April it considered the 13-year-old operating system retired. “Even though Windows XP is no longer supported by Microsoft and is past the time we normally provide security updates, we’ve decided to...

Read more

28
Apr

Hackers targeting a newly discovered flaw in Microsoft Internet Explorer

Hackers around the globe are already exploiting this new flaw, affecting the popular Internet Explorer versions 6 through 11. The flaw relies on a well-known flash exploitation used to bypass Windows security protection. Once the hacker is in, they can install malicious software without your knowledge. Microsoft is currently investigating this flaw and we would quickly expect more information on a fix/patch, due to its large risk profile. For more information on the flaw and recommended...

Read more

28
Apr

Aftermath of Heartbleed Bug

In the aftermath of this month’s bug “Heartbleed,” security experts say there is little Internet users can do to protect themselves from this month’s recent discovery of the “Heartbleed” bug that exposes data to hackers. It is all up to website operators to fix, not website users. Researchers have observed advanced hacking groups conducting automated scans of the internet in search of Web servers running a widely used Web encryption program knows as OpenSSL that makes them vulnerable to the...

Read more

22
Apr

Check out Protelligent’s New Website

Protelligent has launched its new website, protelligent.net, premiering new user-friendly features, streamlined content, and a more accessible format for all. “Protelligent’s new website is designed with customers’ needs in mind,” said CEO Christopher George. “Customers can access a remote support feature directly from the website that ensures rapid response and issue remediation for the end-users we support. Website visitors will enjoy the original blog content, real-time industry alerts,...

Read more

28
Mar

Is your technology environment protected?

You need to evaluate your business’ security posture, and make informed, balanced decisions about protecting yourself from threats to your business. Reduce your risk and achieve Zen for your business with the following safeguards:

Read more

21
Feb

Cloud Computing Isn’t Just Technology – It’s Strategy

The term “cloud computing” is everywhere but what does it mean? Over the last few years, the concept of the cloud has come to mean different things to different people. Let’s start with the basics. What is cloud computing? The cloud is a source of highly scalable services that can be accessed on-demand over the Internet. Simply put, cloud computing introduces new and better kinds of services and connections, and decreases costs associated with technology infrastructure and personnel. How is...

Read more

21
Feb

Giving Back to our Community

Protelligent’s recent expansion to Spokane, Washington was a success. Christopher George, CEO of Protelligent, personally thanks the community for the inviting welcome. The Protelligent team is looking forward to the future and being involved with a closely connected community. To share in the support of the community, Protelligent made a generous contribution to a local charity, Vanessa Behan Crisis Nursery which helps keep children safe by providing immediate refuge and ongoing family support.

Read more