How to avoid malicious phone apps and limit the information they collect about you.
If you are like me, your cell phone is a part of your identity. It is the first thing you reach for when you wake up and the last thing you check when you go to sleep. You check the weather, the latest sports scores, look up movie times, order a rideshare, get the latest…
Read MoreDo You Use the Same Password for Multiple Sites? Here’s Why That’s a Bad Idea
By Michael McCool Do you currently use a password manager? If not, you are probably reusing the same password or variations of the same password for every site you visit. This is a really bad idea. It’s not really a matter of if one of the sites you visit will be hacked, but when. The…
Read MoreMunicipalities and Small Businesses Take Notice: Cybercriminals are After You
Two municipalities were hit by ransomware last month and forced to pay approximately $600,000 each to regain access to city email and computer systems. One city, Riviera Beach, Florida, has roughly the same size population as the Kirkwood-Des Peres area where our offices are located. For three weeks, Riviera Beach’s email and computer systems were…
Read MoreThe Miller Group again named to list of 501 top MSPs in the nation.
12th Annual MSP 501 Identifies Top Forward-Thinking Global MSPs & Leading Trends in Managed Services The Miller Group has been named as one of the world’s premier managed service providers on the prestigious 12th annual Channel Futures MSP 501 rankings. Every year, MSPs worldwide complete an extensive survey and application to report their product offerings, growth…
Read MoreJoe’s Musings: Dattocon, FBI’s Most Wanted Hacker, ex-CEO of billion dollar company, a party on the U.S.S. Midway, and Snoop Dogg
A personal experience: Like most industries, the IT world has its fair share of conventions. Most of them are the same; pretty boring, full of your typical IT geeks and the vendors catering to them. Think of Comic-Con, but with computers instead of comic books. Last week I spent 4 days…
Read MoreStart using two factor authentication – like yesterday
Two-factor authentication is an authentication mechanism to double check that your identity is legitimate. Not a week goes by that we don’t receive a frantic phone call from someone with a compromised account. A bad actor has cracked their email password and sent out thousands of spam emails. Each one of these phone calls could have been avoid if they would have enabled two-factor authentication for their account.
Read MoreCritical Windows Security Update!
Earlier this week Microsoft released fixes for a critical Remote Code Execution vulnerability in Remote Desktop Services that affects some older version of Windows and Windows Server. So, why should I care? Well, if you have a Windows 7 or heaven forbid a Windows XP computer, you need to worry. If your company runs a Windows 2008 Server or for some reason still a Windows 2003 Server, you better take this warning serious.
Read MoreA Flooding Natural Disaster Guide
Damage due to flooding in the US amounts to an average of almost $8 billion annually. Undoubtedly, small businesses like yours are part of that devastation. But, even if your building is completely underwater, your business data and operations don’t have to be. Learn about the risk factors of flooding, and what considerations to take…
Read More