by MadHatterTechs | Jul 3, 2017 | Uncategorized
Security loop holes have been known to cause major damage to your business or even your home. Protect your wireless network from various attacks by locking it down. Here are some tips to keep yourself protected: 1. Use WPA/WPA2 encryption with a strong pass-phrase. If...
by MadHatterTechs | Jul 3, 2017 | Uncategorized
Is Your Mac Really Safe? A common perception is that Macs are inherently more secure and less prone to malware than their PC counterparts. But is this true? In this article I want to offer a little perspective on this common perception and explain why owning a Mac...
by MadHatterTechs | Jul 3, 2017 | Uncategorized
A recent conversation with a colleague had to do with the benefits of the cloud. The question at hand was whether it’s better for companies to move their IT assets to the cloud, or to handle their own network infrastructure and data storage? And like everything in IT...
by MadHatterTechs | Jul 3, 2017 | Uncategorized
Bad guys are using a malicious software to remotely access a user’s webcam and spy on them. The malicious software is called a RAT, which stands for Remote Access Trojan. And once installed, it gives the bad guys control over your computer’s webcam. Accessing other...
by MadHatterTechs | Jul 3, 2017 | Uncategorized
We recently consulted with a local business that needed a project management and accounting solution. And we were so blown away by all the great (and occasionally free) products out there that we thought we’d share some of what we found. This blog is for anyone...
by MadHatterTechs | Jul 3, 2017 | Uncategorized
Encryption viruses may be one of the scarier viruses out there. For those of you unfamiliar with how they work, an encryption virus gets onto your system and starts encrypting documents and files. This renders the files unreadable by the applications that created...